Skip to content

Injectics

Can you utilise your web pen-testing skills to safeguard the event from any injection attack?您能否运用您的网络渗透测试技能来保护活动免受任何注入攻击?

靶机地址:10.10.108.231

访问网站源代码发现存在提示信息

image

<!-- Website developed by John Tim - dev@injectics.thm-->

存在可用用户名邮箱:dev@injectics.thm

image

使用xia-sql插件发现存在万能密钥可以直接登录dev用户

image

输入用户名dev@injectics.thm'||1/1||',密码随意,注意不能在前端直接输入,存在script.js过滤

dev@injectics.thm'||1/1||'

image

尝试测试SSTI注入,发现可以成功执行7*7=49,但无法使用{}来注入模板,猜测要么是后端是eval函数或者是直接拼接SQL语句,数据库识别后执行了。

image

image

发现mail.log中有账号密码,要求需要删除表users后会重新构建新账号密码

image

From: dev@injectics.thm
To: superadmin@injectics.thm
Subject: Update before holidays

Hey,

Before heading off on holidays, I wanted to update you on the latest changes to the website. I have implemented several enhancements and enabled a special service called Injectics. This service continuously monitors the database to ensure it remains in a stable state.

To add an extra layer of safety, I have configured the service to automatically insert default credentials into the `users` table if it is ever deleted or becomes corrupted. This ensures that we always have a way to access the system and perform necessary maintenance. I have scheduled the service to run every minute.

Here are the default credentials that will be added:

| Email                     | Password 	              |
|---------------------------|-------------------------|
| superadmin@injectics.thm  | superSecurePasswd101    |
| dev@injectics.thm         | devPasswd123            |

Please let me know if there are any further updates or changes needed.

Best regards,
Dev Team

dev@injectics.thm

破坏表users结构,使用堆叠注入

1;DROP table users;

image

image

等待1-2分钟后,使用mail.log中账号密码登录到管理员

image

THM{INJECTICS_ADMIN_PANEL_007}

登录到管理员后发现存在新功能点Update Profile,猜测存在SSTI注入

image

image

目录扫描发现存在composer.json文件使用require引入了twig模板

image

查找跟twig模板注入相关资料,利用sort函数性质,可以调用函数passthru执行命令

image

image

image

image

THM{5735172b6c147f4dd649872f73e0fdea}

Copyright © 2025-present Dragonkeep