sekaiCTF2023/textsender Writeup
Solution to the textsender
heap challenge from the event.
Textsender
This was a pretty easy pwn challenge with 138 solves during the CTF.
This was a cool heap challenge from the CTF. it consisted of a menu, thate lets the user do 5 things:
Set sender
- this will call malloc(0x78), store the address in thesender
global variable, and ask for user input.Add message
- this function will allocate a new message on the heap. It will first allocate the message structs, and then thereceiver
and themsg
. then it will ask the user for inputs.Edit message
- this function will take a username from the user, and let the user change the msg of that receiver.Print all
- prints all the messagesSend all
- this will basiclly free all the messages from the heap.
Now, I was looking for vulnerabilites.
I noticed, that in the add_message
function, they used the input
function to write our input to the new allocated chunk.
They also gave the function a size parameter, so that it knew how many bytes to read. I noticed that the size is exactly the same size of the chunk.
The input function will just use scanf("%{len}%s%*c")
so that means that if we write len
bytes, a null byte will be written in receiver[len]
, which is a null byte overflow!
How it looks in GDB:
Before:
After:
Exploitation
I knew we needed to use the house of einherjar
.
The idea is to overwrite into the size
of the next chunk in memory and clears the PREV_IN_USE
flag to 0. (as we saw in GDB, from 0x201, we made the next chunk size 0x200)
Also, it overwrites into prev_size (already in the previous chunk’s data region) a fake size. (this could be seen in 1 quadboard before the 0x200 sizefield)
When the next chunk is freed, it finds the previous chunk to be free and tries to consolidate by going back ‘fake size’ in memory.
But in reality, the previous chunk isn’t even freed. this can give us an overlapping chunks primitive which is very very strong.
Now, I was searching for leaks. the house of einherjar requires a leak, becuase of this check in malloc.c
:
|
|
we need to satisfy the equations: fake chunk->fd->bk = fake_chunk
and fake chunk->bk->fd = fake_chunk
, which requires a heap leak.
When searching for leaks, I noticed that in the add_message
function,the allocated memory isn’t initialized.
this means, that if we have a message A
, free it, and then allocate it again, heap meta data will be in our new chunk’s user data.
The problem is that when it asks for input, it will nullterminate our string. so after we try to read it, it will just stop at the null byte and won’t check stuff after it and leak us stuff.
There is a really cool bypass to that, in the edit_message
function:
This function will ask the user for a name
, and look through all the messages for a message with that name.
If it finds a name, it will let us edit it, otherwise, we will know it couldn’t find a name.
Lets see this behaviour in gdb. I added this function calls to my python script:
|
|
The first part will basiclly allocate 7 chunks, which then will fill up the tcache (their fd is mangled, and I prefer to leak fastbin’s metadata)
then we add another msg, and then free them all. then we allocate chunk_a
, which its username will be takes from the 0x80 fastbin.
This is how it looks like in gdb:
It will write the name we gave it + a nullbyte. The other metadata is still there.
Now, we can use the edit_message
function, to bruteforce byte-byte the 2 next bytes! we can start by supplying a name = \x61\x00\x01
, and if the next byte is 0x01, it will let us edit, if it doesn’t , we’ll try name = \x61\x00\x02
, until we can edit.
We do it twice, and this will leak us the third and fourth bytes of the heap. The heap will always contain 3/4 bytes (PIE is not enabled in our case), and we know that the base address will always start with 000.
This means we would need to bruteforce 1 nibble, but thats fine, because it has success rates of 1/16.
here is my brute force:
|
|
Now, we are ready to exploit the house of einherjar!
So lets say we have an overlapping chunks. what would we want to overwrite?
There is the msg struct! it contains pointers to both the name, and the msg strings, and if we could tamper with the msg string and then use the edit function, we can get an arbitrary write primitive.
Lets delete all the previous messages and allocate a new message:
|
|
This is how it looks in the heap:
Now, with our null byte overflow, we will create a fake chunk before the msg struct (i.e before 0x4062b0)
By tampering with the chunk’s prev_size, we can set prev_size = 0xf0, which will free the chunk located at victim - 0xf0
. here is how it looks like in the heap:
To bypass malloc mitegaions, we need to make sure that victim - 0xf0
size’s field is indeed 0xf0. here is how I shaped it in my script:
|
|
if we try to run it, it will crash, because it will check the bk and the fd of our fake chunk:
|
|
Here is how it looks like in assembly: (RDI points to our fake chunk)
|
|
So, it will check if *(*(rdi + 0x10) + 0x18) == RDI
.
Lets supply fd = bk = p (i.e *(rdi + 0x10) = *(rdi + 0x18) = rdi)
The check will check if *(rdi + 0x18) == RDI
. we can control rdi + 0x18
, so we can just write the address of the chunk there.
It will have another check after it, which will check *(rdi + 0x20)
, so we write p’s address twice.
|
|
Now, we’ll allocate 6 chunks to fill up the tcache bins, and we trigger our null byte overflow bug. Then we free everything up, which will consolidate the chunk with our fake chunk of size 0xf0. this is how it looks like in the heap:
This is our bins state after the consolidation:
the tcaches are full , so in order to get the unsortedd bin we need to allocate 7 messages.
Then our next message’s msg field will be allocated from our fake chunk, and we can overwrite the msg struct.
We will change the msg pointer to a location we would like to read/write to (free got), and then use the edit function to leak its contents and write into it.
In order for the edit function to find our msg, we need to change the name pointer aswell. The edit function will use free
at the end with the name as a paremeter, so if we enter /bin/sh
as the name, free(/bin/sh)
will be called.
But if we write into free got, the system address, system(/bin/sh) will be called. Here is my final script:
|
|
Appendix
I really enjoyed this challenge, it taught me a lot about nullbyte overflows and how they can be exploited in the heap.
If you have any question regarding the above solutions, you can DM me via my Twitter
or my Discord
(itaybel).