command injections are among the most critical types of vulnerabilities
allows us to execute commands directly on the back-end hosting server
if the web app uses user-controlled input to execute system commands on the back-end server then we might be able to inject a malicious payload
injection vulnerabilities are #3 risk for OWASP top 10 web app risks
most common types of injections:
- OS command injection = user input as part of OS command
- Code injection = user input within function that evaluates code
- SQL injection = user input is used as part of SQL query
- XSS/HTML injection = exact user input is displayed on the web page
many other types like LDAP, NoSQL, HTTP header, XPath, IMAP, ORM
user input we control must directly or indirectly go into a web query that executes system commands
all web programming languages have functions to execute OS commands directly on the back-end server
PHP has commands like exec
, system
, shell_exec
, passthru
or popen
this is an example of code vulnerable to command injections:
in the above code, user input is directly used with the touch
command which could be used to execute arbitrary system commands on the back-end server
nodejs has functions like child_process.exec
or child_process.spawn
similar to php
here is a nodejs example similar to the above PHP code:
again, user input is being directly used with the touch command
command injection vulnerabilities are not unique to web apps and can also affect other binaries and thick clients
the process of detecting basic OS command injections is the same process for exploiting them
we attempt to append our command through various injection methods
might not be true for advanced injections because we may use fuzzing methods or code reviews to identify them
our target site has input for pings:
from the output we can see that the ping
command is being used, and it might be something like:
ping -c 1 <input>
if our input is not sanitized then we might be able to inject another command
;
=%3b
- executes both commands\n
=%0a
- both&
=%26
- both and typically second output shown first|
=%7c
= both but only second output shown&&
=%26%26
= both if first succeeds||
=%7c%7c
= second only if first fails- backticks =
%60%60
= both for linux only $()
=%24%28%29
= both for linux only
these operators can generally be used regardless of web app language, framework, or back-end server
there are some odd exceptions like ;
which won't work with windows command line (CMD)
we can first try adding a semi-colon and appending our arbitrary command to hopefully make the final command something like:
ping -c 1 127.0.0.1; whoami
when we try to use our payload we get an error message:
however, this appears to only be for the frontend as we can see no requests are sent through:
the easiest method to customize HTTP requests is to use a web proxy
we can send a normal query and intercept it to then send it to the repeater:
we can then edit this request and URL encode it with CTRL+U
:
then we can see our command worked in the response:
&&
will produce similar output by executing both commands:
||
will only execute the second command if the first fails to execute
could be useful if our injection would break the original command without having a way for both commands to work
in bash, if the first command returns exit code 0 then execution is successful
the command would then stop and not try the other command after ||
if the exit code is 1 then it will execute the the next command
we can intentionally try to break the intended command by not supplying an IP and only providing our arbitrary command:
now the response will only include our arbitrary command output:
many applications have operator types that produce the same types of results:
whitebox pentesting 101: command injection module goes further into indirect injections and blind injections
another type of injection mitigation is using blacklisted characters or words on the backend to detect injection attempts
WAF can also be used to prevent injection methods
now our target has some extra functions, so when we try our previous payloads we see a new "invalid input" message:
instead of the previous tooltip message, we can now see that we have triggered a security mechanism that denied our request
we can see that the app used a field to output the error message, meaning that it was detected and prevented by the PHP app itself
if the error message displayed a different page entirely with info like our IP and our request, then it may have been denied by a WAF
if our payload looked like this:
127.0.0.1; whoami
then we can determine that there were 3 possible things that set off the error:
;
- space
whoami
php code that looks for specific blacklisted characters could look like:
if any character in the input string matches a character in the blacklist then the request is denied
ideally we would like to see which character caused the request to be denied
we can see that even just the ;
will set off the detection:
so now we can try all injection operators to see which ones might get past the filters
using the url encoded new-line we can achieve our intended command output:
as we can see from the previous example, new line characters are typically not blacklisted
we can see that adding on to the accepted new line character will not be accepted:
127.0.0.1%0a+whoami
there are many ways to add spaces without using the space character
using tabs %09
may work because linux and windows accept commands with tabs between arguments, and they are executed the same
we can see that using the tab character without our payload will be accepted:
$IFS is a linux environment variable that may work because its default value is a space and a tab, which would work between command arguments
${IFS}
can be used where the spaces should be and the variable should be automatically replaced with a space
we can see that this will work on our target as well:
bash has a brace expansion feature which will add spaces between arguments between braces:
{ls,-la}
we can use the same method in command injection to use brace expansion on our command arguments:
127.0.0.1%0a{ls,-la}
PayloadAllTheThings also has more space filter bypasses
besides injection operators and space characters, commonly blacklisted characters are /
and \
because they are necessary to specify directories in windows and linux
many different ways to use slashes in our payload
one technique we can use to replace slashes or any character is through linux environment variables like we did with ${IFS}
${IFS}
is replaced with a space, but there's no variable for slashes or semi-colons
however, these characters can be used in an environment variable and we can specify start and length of our string to match this character
for example we can look at the $PATH
environment variable:
with $PATH
we can start at the 0 character and only take a string of length 1 to grab only the /
character:
we can do the same with $HOME
or $PWD
and other commands to get characters like the semi-colon:
printenv
will print all environment variables in linux so we can look at which ones have useful characters
now we can try to use environment variables to add a semi-colon and space to our payload:
the same techniques will work in windows command line
we can echo
a windows variable and specify a start position and a negative end position which would need to be the length of the username:
we can do the same thing using the same variable in powershell
words are considered arrays in powershell, so we need to specify the index of the character we need:
$env:HOMEPATH[0]
we can also Get-ChildItem Env:
to print all environment variables
linux commands can shift the character we pass by 1, so we just need to find the character in the ASCII table that is just before the character we need
we can get the ascii value with man ascii
then add it instead of [
in:
echo $(tr '!-}' '"-~'<<<[)
\
is on 92, before it is [
on 91
powershell can do the same thing but the command will be a bit longer than linux ones
if we wanted to see the name of the user in the /home
directory we can use the following payload:
127.0.0.1%0a{ls,${PATH:0:1}home}
specific commands like ls
or whoami
will also be blacklisted
a command blacklist usually has a set or words but we can obfuscate our commands to make them look different
a basic command blacklist filter could look like:
filters like this will match an exact word so if we send slightly different commands we could bypass it
one very command and easy obfuscation technique is inserting characters that are usually ignored by command shells like bash or powershell
some of these characters are '
and "
and some others
quotes are easiest to use and work on both windows and linux
if we wanted to obfuscate whoami
we can use single quotes between characters:
w'h'o'am'i
the same will work with double quotes
important to remember that we can't mix types of quotes and the number of quotes must be even
we can see that using quotes will execute our payload:
there are some other linux-only characters that bash will ignore:
\
$@
these will work the same as quotes but the number of characters do not need to be even, and we can insert only one if we want to:
who$@ami
characters like ^
will work the same for windows only:
who^ami
adding to the previous command to find the user in the /home
directory will allow us to view the flag file in their directory:
some apps like those with WAF will have more advanced filter solutions, and our previous techniques may not work
however there are more advanced methods to potentially bypass these filers as well
case manipulation inverts the character cases of a command like WHOAMI
and WhOaMi
this may work if the command blacklist does not check for different case variations of a single word, and linux systems are case sensitive
in windows servers we can change the casing of characters and send it
powershell and CMD commands are case-insensitive:
however with linux we need to find a command that turns our payload into an all-lowercase word:
$(tr "[A-Z]" "[a-z]"<<<"WhOaMi")
keep in mind though that if we were to use the above command in our payload that we would still need to use bypass methods to modify characters like the spaces:
there are many other commands to do similar things like:
$(a="WhOaMi";printf %s "${a,,}")
another technique is to reverse commands and have a command template that switches them back and executes them in real time
in this case we will be writing imaohw
to avoid triggering the blacklisted command
we can reverse a string in linux with:
echo 'whoami' | rev
once we have our reversed string we can execute the original command by reversing it back in a sub-shell:
$(rev<<<'imaohw')
in windows we can reverse a string with:
"whoami"[-1..-20] -join ''
then we can execute the reversed string in a powershell sub-shell:
iex "$('imaohw'[-1..-20] -join '')"
some commands may contain filtered characters or characters that are URL-decoded by the server
we can use various encoding tools like base64 or xxd
first we can encode our payload:
echo -n 'cat /etc/passwd/ | grep 33' | base64
then we can create a command to decode the encoded string in a sub-shell and pass it to bash to be executed with bash<<<
:
bash<<<$(base64 -d<<<Y2F0IC9ldGMvcGFzc3dkIHwgZ3JlcCAzMw==)
note that <<<
can be used to avoid using |
which is a filtered character
if commands like base64
or bash
are filtered then we can use techniques like character insertion or use alternatives like sh
for command execution and openssl
for base64 decoding or xxd for hex decoding
for windows we can encode our string:
[Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes('whoami'))
we could also do the same on linux but we have to convert the string from utf-8 to utf-16 before we base64 it:
echo -n whoami | iconv -f utf-8 -t utf-16le | base64
then we can decode the base64 string and execute it with a powershell sub-shell:
iex "$([System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String('dwBoAG8AYQBtAGkA')))"
these types of obfuscation methods have not been used before because we decide how we want to hide our commands, so they are likely to bypass filters and WAFs
in addition to these methods we can use other methods like wildcards, regex, output redirection, integer expansion, and many others
PayloadAllTheThings has more of these methods
if we wanted to use the payload find /usr/share/ | grep root | grep mysql | tail -n 1
, we could first base64 encode it:
then use it in a sub-shell to get the output:
if we are dealing with advanced security tools we might not be able to used basic, manual obfuscation techniques
can clone the github repo with:
git clone https://github.com/Bashfuscator/Bashfuscator
cd Bashfuscator
pip3 install setuptools==65
python3 setup.py install --user
we can provide any command we want with the -c
flag:
./bashfuscator -c 'cat /etc/passwd'
running the tool this way will randomly pick an obfuscation technique which could output a wide range of command lengths
we can fine tune the output with flags:
./bashfuscator -c 'cat /etc/passwd/' -s 1 -t 1 --no-mangling --layers 1
we can test the output with bash -c ''
to see if it works
interactive tool
can clone from github:
git clone https://github.com/danielbohannon/Invoke-DOSfuscation.git
cd Invoke-DOSfuscation
Import-Module .\Invoke-DOSfuscation.psd1
Invoke-DOSfuscation
can use tutorial
to see an example of how the tool works
can start using the tool like:
SET COMMAND type C:\Users\htb-student\Desktop\flag.txt
encoding
1
note that we can test this on a windows machine through linux machine with pwsh
secure coding 101: javascript has more advanced obfuscation methods
should always avoid using functions that execute system commands, especially with user input
even without user input a user may indirectly influence them
should instead use built-in functions that perform the needed functionality
for example if we wanted to test if a host is alive with PHP we can use fsockopen
should be performed on frontend and backend
in php and other languages there are built in filters for variety of standard formats like emails, urls, and IPs
can use these with filter_var
:
if we wanted to validate a different, non-standard format then we can use a regex with preg_match
function
javascript can do this with:
libraries like is-ip
are also available to do these tasks
input sanitation always performed after validation
always good in case a bad regex
should generally use built-in functions to remove special characters instead of relying on blacklisting code like the example above
can use preg_replace
and replace
to remove special characters:
DOMpurify
is another good library for NodeJS:
if we wanted to allow special characters then we can use filter_var
and use escapeshellcmd
filter to escape special characters
for NodeJS we can use escape()
however escaping characters is often not secure because it can be bypassed
should always ensure that back-end server is configured to reduce the impact in the event of compromise
some configs are:
- use built in WAF like apache
mod_security
in addition to external WAF likeCloudFare
- principle of least privilege by running web server as low privileged user like
www-data
- prevent certain functions from being executed by the server (PHP `disable_functions=system,...)
- limit scope accessible by web app to its folder (PHP `open_basedir = '/var/www/html')
- reject double-encoded requests and non-ASCII characters in URLs
- avoid using sensitive or outdated libraries and modules
contracted to do a pen test for a company
found an interesting file manager web app
file managers tend to execute system commands so we need to test for injection vulnerabilities
use various techniques to detect a command injection vulnerability and then exploit it
our target site after logging in shows:
using the hamburger menu we can see two search bars for possible payload injection:
using these searches doesn't seem to produce any errors or requests we could inject on
looking around the page we can use many of the "Actions" that are listed for each file, and they appear to be executing OS commands like linux mv
:
after submitting a successful request to move a file to the tmp
folder I send it to the burp repeater to try a payload in the to
parameter and get an error:
so now that it appears to have protections against injections I attempt to isolate the errors and see which injection characters can send a successful request:
using a character substitution I appear to get a valid request:
however using some encoded characters doesn't seem to work:
after trying a few different payload characters it seems that encoded &
gets through and we can see our reversed and injected whoami
command appear with a successful file transfer:
now I want to try to use an ls -la
and to do this I base64 encode it:
then I use the sub-shell bash and base64 payload to decode and execute the command to get the results:
now I just have to keep looking around until I eventually find the flag file:
then use the same encoding on cat ../../../flag.txt
to read the flag