File: ret2csu.py

package info (click to toggle)
pwntools 4.14.1-1
  • links: PTS, VCS
  • area: main
  • in suites: sid, trixie
  • size: 18,436 kB
  • sloc: python: 59,156; ansic: 48,063; asm: 45,030; sh: 396; makefile: 256
file content (108 lines) | stat: -rw-r--r-- 4,458 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
from __future__ import absolute_import
from __future__ import division

from capstone import *
from capstone.x86 import *

from .rop import Padding
from ..log import getLogger
from ..util.packing import p64


log = getLogger(__name__)


def ret2csu(rop, elf, edi, rsi, rdx, rbx, rbp, r12, r13, r14, r15, call=None):
    """Build a ret2csu ROPchain

    Arguments:
        edi, rsi, rdx: Three primary registers to populate
        rbx, rbp, r12, r13, r14, r15: Optional registers to populate
        call: Pointer to the address of a function to call during
            second gadget. If None then use the address of _fini in the
            .dynamic section. .got.plt entries are a good target. Required
            for PIE binaries.
    """

    # Prepare capstone
    md = Cs(CS_ARCH_X86, CS_MODE_64)
    md.detail = True
    md.skipdata = True

    # Resolve __libc_csu_ symbols if candidate binary is stripped
    if '__libc_csu_init' not in elf.symbols:
        textaddr = elf.offset_to_vaddr(elf.get_section_by_name('.text').header.sh_offset)
        entry = elf.entry
        data = elf.section('.text')[entry-textaddr:]
        mnemonic = elf.pie and 'lea' or 'mov'
        for insn in md.disasm(data, entry):
            if insn.mnemonic == mnemonic:
                if mnemonic == 'lea':
                    addr = insn.address + insn.size + insn.disp
                else:
                    addr = insn.operands[1].imm

                if insn.operands[0].reg == X86_REG_R8:
                    elf.sym['__libc_csu_fini'] = addr
                if insn.operands[0].reg == X86_REG_RCX:
                    elf.sym['__libc_csu_init'] = addr
                    break
            elif insn.mnemonic == 'xor' and insn.operands[0].reg == insn.operands[1].reg == X86_REG_ECX:
                log.error("This binary is compiled for glibc 2.34+ and does not have __libc_csu_init")
            elif insn.mnemonic in ('hlt', 'jmp', 'call', 'syscall'):
                log.error("No __libc_csu_init (no glibc _start)")
        else:
            log.error("Weird _start, definitely no __libc_csu_init")

    # Resolve location of _fini address if required
    if not elf.pie and not call:
        call = next(elf.search(p64(elf.dynamic_by_tag('DT_FINI')['d_ptr'])))
    elif elf.pie and not call:
        log.error("No non-PIE binaries in [elfs], 'call' parameter is required")

    csu_function = elf.read(elf.sym['__libc_csu_init'], elf.sym['__libc_csu_fini'] - elf.sym['__libc_csu_init'])

    # 1st gadget: Populate registers in preparation for 2nd gadget
    for insn in md.disasm(csu_function, elf.sym['__libc_csu_init']):
        if insn.mnemonic == 'pop' and insn.operands[0].reg == X86_REG_RBX:
            rop.raw(insn.address)
            break
    # rbx and rbp must be equal after 'add rbx, 1'
    rop.raw(0x00)  # pop rbx
    rop.raw(0x01)  # pop rbp

    # Older versions of gcc use r13 to populate rdx then r15d to populate edi, newer versions use the reverse
    # Account for this when the binary was linked against a glibc that was built with a newer gcc
    for insn in md.disasm(csu_function, elf.sym['__libc_csu_init']):
        if insn.mnemonic == 'mov' and insn.operands[0].reg == X86_REG_RDX and insn.operands[1].reg == X86_REG_R13:
            rop.raw(call)  # pop r12
            rop.raw(rdx)  # pop r13
            rop.raw(rsi)  # pop r14
            rop.raw(edi)  # pop r15
            rop.raw(insn.address)
            break
        elif insn.mnemonic == 'mov' and insn.operands[0].reg == X86_REG_RDX and insn.operands[1].reg == X86_REG_R14:
            rop.raw(edi)  # pop r12
            rop.raw(rsi)  # pop r13
            rop.raw(rdx)  # pop r14
            rop.raw(call)  # pop r15
            rop.raw(insn.address)
            break
        elif insn.mnemonic == 'mov' and insn.operands[0].reg == X86_REG_RDX and insn.operands[1].reg == X86_REG_R15:
            rop.raw(call)  # pop r12
            rop.raw(edi)  # pop r13
            rop.raw(rsi)  # pop r14
            rop.raw(rdx)  # pop r15
            rop.raw(insn.address)
            break
    else:
        log.error("This CSU init variant is not supported by pwntools")

    # 2nd gadget: Populate edi, rsi & rdx. Populate optional registers
    rop.raw(Padding('<add rsp, 8>'))  # add rsp, 8
    rop.raw(rbx)  # pop rbx
    rop.raw(rbp)  # pop rbp
    rop.raw(r12)  # pop r12
    rop.raw(r13)  # pop r13
    rop.raw(r14)  # pop r14
    rop.raw(r15)  # pop r15