Background
On the 8th of February, I participated in the Team Oceania CTF Qualifiers for 8 hours. In order to qualify for the team:
|
|
Since I was born in 1999, I am elligible to qualify, so I attempted to try my best at the web category and get top 2. I was able to get first blood on the login
challenge but unfortunately the challenge took me a long time to solve, so I was unable to solve the remaining two web challenges. They were REALLY good web challenges and wanted to give a massive shout out to hashkitten who authored these challenges. I think if the quality of the challenges were poor, I would have been salty about not making the team but since I knew they were really well-made, I have a lot of confidence in the selection process, and I am looking forward to Team Oceania bringing home the gold!
I have written writeups for the following web challenges:
manic (180)
Description
Hackers keep getting into my manpage service!
http://challenges.oceaniacc.com:5001
Attachments
Writeup
What do we have here?
For this web challenge we are provided the source code via the attached compressed file src-manic.tar.gz
. We decompress with the following command:
|
|
The source code consists of a python web application which essentially allows us to read the manual pages for specified commands.
For example, browsing to the link http://challenges.oceaniacc.com:5001/1/grep
will give us section 1 of the grep
command manual page.
How this works is it’s essentially running the man
command in the backend with the arguments inputted within the URL, and displaying the output on the webpage:
|
|
This logic can be observed at app.py#L11-L23
|
|
Let’s break down the code so that we can understand the security controls in place and if there are any vulnerabilities that arise.
Source Code Breakdown
First, let’s look at how the user inputs are initially passed.
|
|
A route is set up at the root of the webpage “/” and defines a dynamic URL parameter named command
with the type path
. Any input in the URL path after the root “/” will be saved in this command
parameter.
This command parameter is passed to the show_man_page
function and the value is split into a list, with the delimiter being “/”.
For example, when the URL is /1/grep
, the value of command will be 1/grep
and the value of command_list
will become ["1","grep"]
.
Following this, we observe a security control that attempts input sanitisation:
|
|
This code iterates through the command_list
list with i
being the index of the iteration and cmd
being the value at the index.
For each iteration, using the isalnum function, if the value contains any characters that are not letters or digits, the list is modified to remove the current index.
While this could be seen as appropriate input filtering to not allow special characters, a bypass can occur due to modifying the list while it is being iterated through.
Say our command_list
variable contains the value ["1","i!!egal","also_illeg@l", "valid", "also_valid"]
. You would expect index 1 and 2 of the array to be deleted to result in ["1", "valid", "also_valid"]
. However, this is not the case.
Let’s see what happens in each iteration.
Iteration 0:
|
|
Iteration 1:
|
|
Iteration 2:
|
|
After the rest of the iterations, as the following values are valid, nothing else gets deleted:
|
|
This occurs because when we process index 1 and delete it, the value of index 1 becomes the value of index 2, and so on the next iteration at index 2, we have skipped the original value of index 2.
We have successfully found a bypass on the input sanitisation method, now allowing us to input arbitrary characters (besides “/” due to the split function removing all of those).
Moving on to the juicy part, command execution!
|
|
We can see that the man
command is executed with arguments provided by the user. If the inputs were only alphanumeric, then this code may not vulnerable, but as we found a way to bypass the input sanitisation, we can use hyphens to do argument injection.
Finding the Right Argument to Inject
One thing I tried to do is to see if we can do things such as glob expansions or command substitution, however, due to how the run function works, command substitutions or other shell shenanigans won’t be executed.
Let’s step back to see what our objectives are. To obtain the flag, we can:
- Attempt to read the flag file at
/flag.txt
with theman
binary - Execute other binaries to obtain the contents of
/flag.txt
The location of the flag can be observed at Dockerfile#L11
:
|
|
This part will require you to research each option until you are able to read the flag file. During my attempt of the challenge, I thought I could change the MANPATH and change the extensions of man pages that I read:
|
|
Testing man --manpath=/ --extension=txt
locally did not work unfortunately and resulted me in getting stuck on why that didn’t work. I never found out why due to the lack of documentation and was unable to solve the challenge during the CTF duration.
On review of the solution after the CTF finished, I felt very silly not checking this option out.
|
|
The fact that it says www-browser
is a big hint because I have seen it link to the lynx browser in Debian. I can see this on my Debian install:
|
|
So, theoretically, if I specify another binary that isn’t a browser, it should execute. I tried to do this locally and execute the ls
command, but it didn’t work. I don’t know the reason why but might be because it’s a different implementation of man
compared to the container’s man
binary.
|
|
EDIT: Someone mentioned it not working on local machine on discord after the CTF and hashkitten (the author) mentioned you need to install some packages.
I ran it in a local docker container instead, using the provided Dockerfile to match the exact environment and I was able to execute the ls
binary!
|
|
Utilising the Command Injection
Testing with a few other commands, I found that the command being executed will look like this:
|
|
So man --html=ls man
will execute ls /tmp/<RANDOM_STRING>/man.html
.
You can also include arguments for your commands like man --html="ls -l" man
Now all we have to do is read the flag!
|
|
Sure that works on the docker container, however, there’s a forward slash required in our payload! To bypass this, we identify that the command we specify in the HTML argument is safe from the subprocess.run
function’s safe argument passing, allowing us to do shell expansions. Therefore, we can specify a slash with parameter expansion as we know the first character of the env variable PATH
will be “/”:
|
|
Our final command executed in the container will look like this:
|
|
Ok now we got a PoC working in the container. Time to convert this in URL form:
|
|
When sending this we get the following error:
|
|
Weird, is it not expanding properly? I try with just ${PATH}
:
|
|
Ok it actually resolved the PATH
variable. It is known that the colons to extract substrings in parameter expansions don’t work in sh
, so maybe it’s executing in a primitive shell. Looking at the solution, it uses the %
operator which is used for pattern removal in parameter expansion. I can use this operator instead to remove the rest of the string to only give me /
. I can’t use PATH
though because it contains multiple forward slash characters. Let’s see what the value of PWD
is.
|
|
Note:
PATH
andPWD
are well-known environment and shell variables. You can check out more common variables here but I prefer just executing theenv
command in the docker container to see what’s available.
I can determine that PWD
is /app
. So if I do ${PWD%app}
, this will result in just /
. The final payload is here:
|
|
URL Encoded:
|
|
At the very top is our lovely flag!
|
|
Other Command Injection Payloads
I wanted to note a few other payloads that were posted in the discord which I thought were interesting.
Python
|
|
Decoded URL:
|
|
Output:
Python code:
|
|
Equivalent Python code
|
|
The use of the chr function in Python is a common method to bypass character restrictions in Pyjails. In this case we are replacing the “/” character with chr(47)
.
Base64
|
|
Decoded URL:
|
|
Output:
Base64 allows the forward slash character to be encoded:
|
|
Not sure why the -l app.py
is there tbh. Might have been artifacts from previous injections. It still works but doesn’t seem like it’s required. The following works:
|
|
Decoded URL:
|
|
One thing I tried with this payload is without the pipe character. So something like this would work if the bash
shell was used:
|
|
However, this redirection operator doesn’t work on sh
which means it won’t on this challenge.
Additionally, I wanted to highlight the use of the command substitution to print the flag in the error message rather than printing to stdout
is very creative. However, this only works because the executable bit is set for the flag.txt
file.
|
|
If stderr is not outputted or the executable bit is not set, I would make the payload like this:
|
|
URL decoded:
|
|
Note a very interesting behaviour between the two payloads:
|
|
|
|
The difference is that the value for the --html
argument is wrapped with double quotes. When wrapped with double quotes, the payload does not work. This is because when wrapping the initial command in a shell with double quotes, it will include the spaces as a part of the binary that it’s searching for to execute.
|
|
Bruh
I found this one funny for some reason. The one thing I love about CTFs is that sometimes you’ll find a solution that seems very obvious but completely crosses your mind. No need for fancy expansions!
|
|
Decoded URL:
|
|
Traverse to parent directory and read the flag… As simple as it can get (as far as I know)!
Sorry if I missed out on any other payloads. Feel free to let me know of any other ideas in the comments and I’ll add them in if they work!
Post challenge thoughts
The reason why I couldn’t solve this challenge was due to my methodology when enumerating what arguments I could abuse. I lacked the experience to identify certain characteristics of arguments that would achieve the objective of reading the flag. In order to improve in this aspect, I have developed a blog to explore enumerating a binary’s options and identifying potential risks to arguments in binaries here (WIP).
beans (230)
Description
Some people made their money in tech, I made it in beans
http://challenges.oceaniacc.com:5002
Attachments
Writeup
DISCLAIMER: I wasn’t able to look at this challenge during the CTF duration, however, I decided to give it a crack without look at the solution first so I could document my thought process.
Background
We are presented with a simple commerce site that allows us to buy and sell beans. We start with 100 bucks and 0 beans and with each bean having the value of 25 dollars. When attempting to press the Get Flag
button, we are presented with the message You need 1337 money for the flag
. Logically, we can’t profit since selling is the same price as buying. Therefore, we need to find a bypass for the amt
variable that would let us sell more than we have to obtain more money.
Let’s take a deep dive into the code!
PHP Type Juggling Behaviour Shenanigans
We first decompress the source code archive:
|
|
I want to specifically look at the sell function because the buy function isn’t going to get me more money.
|
|
We observe the user-defined function validate_integer
which is used to check if the amt
variable is an integer. If the function indicates that it is not an integer, then an error is thrown. Looking at how the validation function works, there is an interesting quirk to it. It uses the trim
function to get rid of whitespaces before checking if the input is a number. Technically, this means that any number with whitespaces is still considered valid.
As an example, I show that numbers that contain spaces before and after are considered valid:
|
|
How could we potentially use this behaviour?
Later in the sell functionality, we observe the conditional expression that checks if we have enough beans to sell. Remember our objective is to sell more beans than we actually have.
|
|
In PHP, there is a feature called type juggling that allows comparisons between different types by attempting to convert them into one or the other.
Let’s explore the behaviour for the less than sign (<):
|
|
When comparing an integer with a string with the less than sign, what happens here is that the integer is converted to a string, and it is compared in alphabetical order. This is interesting to us because if you only observe the integers for the 1st comparison 1<"1a"
, by including a non-digit in our string, in the context of the application there will be a logical error as the expected result for 1<1
is false. This occurs as both values are compared by alphabetical order.
Consider this comparison:
|
|
In the context of the program, it would assume the comparison would be 2<100
which is true in terms of integers. However, if we include a character in the string, it becomes false due to comparing alphabetically when considering both sides as strings! This essentially defines the purpose for the validate_integer
function in an attempt to ensure that string comparisons do not occur.
We have now identified a potential bypass for the beans check if we include non-digit characters within the amt
input. While we can’t include letters like I have done in the examples, we can include whitespace which may potentially still cause the same behaviour of alphabetical comparisons instead.
The Infamous Byte
First we need to look at what characters the trim function will strip to see what are our options. By default the function will strip these characters:
|
|
Next, we want to attempt to replicate the behaviour for 2<100a
returning false.
|
|
We observe the null byte has the same behaviour! Therefore, we can bypass the validate_integer
function and cause the alphabetical comparison to buy more beans than we actually have.
Solving the Challenge
I will be running the following commands on a local docker instance. To set this up:
|
|
First, grab a valid PHP session that tracks our beans and money:
|
|
Buy two beans:
|
|
|
|
Sell 100 beans with a null byte in our amount. To include a null byte in the amt
input, we can use url-encoding. If you want to see the HTML output, you will have to use --output -
to indicate that you want to send to stdout:
|
|
|
|
Now we can buy the flag:
|
|
|
|
To replicate this on the challenge infrastructure:
|
|
Unfortunately, the challenge infrastructure got taken down before I was able to solve this challenge so I don’t have the actual flag 😢
Post Challenge Thoughts
PHP quirks are interesting. I had to ask hashkitten about the string comparison logic because I had no idea why it was doing that originally. I assumed it was just magically removing the 0s in the string for whatever reason.
In hindsight, it does seem pretty obvious now. It would be good to explore PHP type juggling and identify what types get casted to what when type juggling occurs and also for different operators. I’m also interested to know if any other languages are affected by this and what are the differences in how it handles comparing different types. I know JavaScript is another language that has loose types so may have a blog about it in the future.