upload-labs通关笔记(1-5)
Upload-labs是一个帮你总结所有类型的上传漏洞的靶场
项目地址:https://github.com/c0ny1/upload-labs
第一关
思路发现
- 随意上传php木马,发现前端报错,响应速度超快,且数据包未达到服务器,猜测前端js验证源码解读1 
 2
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17function checkFile() { 
 var file = document.getElementsByName('upload_file')[0].value;
 if (file == null || file == "") {
 alert("请选择要上传的文件!");
 return false;
 }
 //定义允许上传的文件类型
 var allow_ext = ".jpg|.png|.gif";
 //提取上传文件的类型
 var ext_name = file.substring(file.lastIndexOf("."));
 //判断上传文件类型是否允许上传
 if (allow_ext.indexOf(ext_name + "|") == -1) {
 var errMsg = "该文件不允许上传,请上传" + allow_ext + "类型的文件,当前文件类型为:" + ext_name;
 alert(errMsg);
 return false;
 }
 }
- 逻辑大致是识别上传文件的后缀名 并查看是否是jpg、png、gif中的一个,否则不允许上传
bypass
1.修改前端不使用该checkfile函数
- 直接可上传php文件成功第二关思路发现
- 上传php显示文件类型不正确
- 抓包查看文件类型字段,猜测会判断Content-Type字段源码解读1 
 2
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19$is_upload = false; 
 $msg = null;
 if (isset($_POST['submit'])) {
 if (file_exists(UPLOAD_PATH)) {
 if (($_FILES['upload_file']['type'] == 'image/jpeg') || ($_FILES['upload_file']['type'] == 'image/png') || ($_FILES['upload_file']['type'] == 'image/gif')) {
 $temp_file = $_FILES['upload_file']['tmp_name'];
 $img_path = UPLOAD_PATH . '/' . $_FILES['upload_file']['name']
 if (move_uploaded_file($temp_file, $img_path)) {
 $is_upload = true;
 } else {
 $msg = '上传出错!';
 }
 } else {
 $msg = '文件类型不正确,请重新上传!';
 }
 } else {
 $msg = UPLOAD_PATH.'文件夹不存在,请手工创建!';
 }
 }
- 逻辑大致是识别上传文件的类型 并查看是否是image/jpge、image/png、image/gif中的一个,否则不允许上传
- $_FILES全局变量
| $_FILES[‘myFile’][‘name’] | 上传文件的原名称 | 
|---|---|
| $_FILES[‘myFile’][‘type’] | 文件的 MIME 类型 | 
| $_FILES[‘myFile’][‘size’] | 已上传文件的大小,单位为字节 | 
| $_FILES[‘myFile’][‘tmp_name’] | 文件被上传后在服务端储存的临时文件名,一般是系统默认。可以在php.ini的upload_tmp_dir 指定 | 
| $_FILES[‘myFile’][‘error’] | 和该文件上传相关的错误代码 | 
bypass
直接抓包改Content-Type为image/png,上传成功
第三关
思路发现
- 直接上传php脚本显示提示:不允许上传.asp,.aspx,.php,.jsp后缀文件!
- 猜测设置了后缀名黑名单源码解读1 
 2
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27$is_upload = false; 
 $msg = null;
 if (isset($_POST['submit'])) {
 if (file_exists(UPLOAD_PATH)) {
 $deny_ext = array('.asp','.aspx','.php','.jsp');
 $file_name = trim($_FILES['upload_file']['name']);
 $file_name = deldot($file_name);//删除文件名末尾的点
 $file_ext = strrchr($file_name, '.'); // 截取'.'后的后缀名
 $file_ext = strtolower($file_ext); //转换为小写
 $file_ext = str_ireplace('::$DATA', '', $file_ext);//去除字符串::$DATA
 $file_ext = trim($file_ext); //收尾去空
 if(!in_array($file_ext, $deny_ext)) {
 $temp_file = $_FILES['upload_file']['tmp_name'];
 $img_path = UPLOAD_PATH.'/'.date("YmdHis").rand(1000,9999).$file_ext;// 随机命名
 if (move_uploaded_file($temp_file,$img_path)) {
 $is_upload = true;
 } else {
 $msg = '上传出错!';
 }
 } else {
 $msg = '不允许上传.asp,.aspx,.php,.jsp后缀文件!';
 }
 } else {
 $msg = UPLOAD_PATH . '文件夹不存在,请手工创建!';
 }
 }
- 尝试使用和php一样解析效果的后缀名,如php3、php4、php5、phtml等后缀名
- 上传成功,并成功解析
第四关
思路发现
- 直接上传php脚本显示提示:此文件不允许上传!
- 需抓包验证检验的参数源码解读1 
 2
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27$is_upload = false; 
 $msg = null;
 if (isset($_POST['submit'])) {
 if (file_exists(UPLOAD_PATH)) {
 $deny_ext = array(".php",".php5",".php4",".php3",".php2",".php1",".html",".htm",".phtml",".pht",".pHp",".pHp5",".pHp4",".pHp3",".pHp2",".pHp1",".Html",".Htm",".pHtml",".jsp",".jspa",".jspx",".jsw",".jsv",".jspf",".jtml",".jSp",".jSpx",".jSpa",".jSw",".jSv",".jSpf",".jHtml",".asp",".aspx",".asa",".asax",".ascx",".ashx",".asmx",".cer",".aSp",".aSpx",".aSa",".aSax",".aScx",".aShx",".aSmx",".cEr",".sWf",".swf",".ini");
 $file_name = trim($_FILES['upload_file']['name']);
 $file_name = deldot($file_name);//删除文件名末尾的点
 $file_ext = strrchr($file_name, '.');
 $file_ext = strtolower($file_ext); //转换为小写
 $file_ext = str_ireplace('::$DATA', '', $file_ext);//去除字符串::$DATA
 $file_ext = trim($file_ext); //收尾去空
 if (!in_array($file_ext, $deny_ext)) {
 $temp_file = $_FILES['upload_file']['tmp_name'];
 $img_path = UPLOAD_PATH.'/'.$file_name;
 if (move_uploaded_file($temp_file, $img_path)) {
 $is_upload = true;
 } else {
 $msg = '上传出错!';
 }
 } else {
 $msg = '此文件不允许上传!';
 }
 } else {
 $msg = UPLOAD_PATH . '文件夹不存在,请手工创建!';
 }
 }
- 逻辑大致大致和上一关类似,只是增加了黑名单量,识别上传文件的类型 并查看是否是黑名单量中的一个,否则不允许上传,可见大小写都包括了,常见的一些后缀也包括了,通过查看资料发现.htaccess后缀文件并未在这个黑名单中,可以进行利用。bypass
- 上传一个.htaccess文件 
- 内容如下,意思为所有文件都用php来解析 - 1 
 2
 3
 4
 5- AddType application/x-httpd-php .png 
 或者
 <FilesMatch "文件名">
 SetHandler application/x-httpd-php
 </FilesMatch>
- 上传一个图片马hacker.png 
- 直接访问该图片地址,均成功! - 第五关- 思路发现
- 和上一关类似源码解读1 
 2
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27$is_upload = false; 
 $msg = null;
 if (isset($_POST['submit'])) {
 if (file_exists(UPLOAD_PATH)) {
 $deny_ext = array(".php",".php5",".php4",".php3",".php2",".html",".htm",".phtml",".pht",".pHp",".pHp5",".pHp4",".pHp3",".pHp2",".Html",".Htm",".pHtml",".jsp",".jspa",".jspx",".jsw",".jsv",".jspf",".jtml",".jSp",".jSpx",".jSpa",".jSw",".jSv",".jSpf",".jHtml",".asp",".aspx",".asa",".asax",".ascx",".ashx",".asmx",".cer",".aSp",".aSpx",".aSa",".aSax",".aScx",".aShx",".aSmx",".cEr",".sWf",".swf",".htaccess");
 $file_name = trim($_FILES['upload_file']['name']);
 $file_name = deldot($file_name);//删除文件名末尾的点
 $file_ext = strrchr($file_name, '.');
 $file_ext = strtolower($file_ext); //转换为小写
 $file_ext = str_ireplace('::$DATA', '', $file_ext);//去除字符串::$DATA
 $file_ext = trim($file_ext); //首尾去空
 
 if (!in_array($file_ext, $deny_ext)) {
 $temp_file = $_FILES['upload_file']['tmp_name'];
 $img_path = UPLOAD_PATH.'/'.$file_name;
 if (move_uploaded_file($temp_file, $img_path)) {
 $is_upload = true;
 } else {
 $msg = '上传出错!';
 }
 } else {
 $msg = '此文件类型不允许上传!';
 }
 } else {
 $msg = UPLOAD_PATH . '文件夹不存在,请手工创建!';
 }
 }
- 上传shell.PhP上传成功
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明来自 bb的博客!
