Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding New Level: Lua Metatable hooks #128

Open
wants to merge 14 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 10 additions & 3 deletions .devcontainer/devcontainer.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,16 @@
{
"onCreateCommand": "sudo apt-get update && sudo apt-get -y install libldap2-dev libsasl2-dev && pip3 install pyOpenSSL && pip3 install -r requirements.txt",
"onCreateCommand": "sudo apt-get update && sudo apt-get -y install libldap2-dev libsasl2-dev lua5.4 luarocks && pip3 install pyOpenSSL && pip3 install -r requirements.txt && sudo luarocks install busted 2.2.0-1",
"customizations": {
"vscode": {
"extensions": ["ms-python.python", "ms-python.vscode-pylance", "ms-vscode.cpptools-extension-pack", "redhat.vscode-yaml", "golang.go"]
"extensions": [
"ms-python.python",
"ms-python.vscode-pylance",
"ms-vscode.cpptools-extension-pack",
"redhat.vscode-yaml",
"golang.go",
"sumneko.lua"
]
}
},
"postCreateCommand": "npm install --prefix Season-2/Level-3/ Season-2/Level-3/ && npm install --global mocha"
}
}
2 changes: 1 addition & 1 deletion .github/workflows/codeql-analysis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ jobs:
strategy:
fail-fast: false
matrix:
language: ['python', 'go', 'javascript']
language: ["python", "go", "javascript"]

steps:
- name: Checkout repository
Expand Down
42 changes: 42 additions & 0 deletions Season-4/Level-1/code.lua
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
-- Welcome to Secure Code Game Season-3/Level-1!

-- Follow the instructions below to get started:

-- 1. tests.lua is passing but the code is vulnerable
-- 2. Review the code. Can you spot the bugs(s)?
-- 3. Fix the code.lua, but ensure that tests.lua passes
-- 4. Run hack.lua and if passing then CONGRATS!
-- 5. If stuck then read the hint
-- 6. Compare your solution with solution/solution.lua

local module = {}


--- Given a request table with empty image entries it should populate it with bitmap images
--- Currently uses a placeholder of 'PLACEHOLDER IMAGE'
--- @param request table: The request table which we will populate with images
--- @return string|table: Of the sources now with the generated bitmaps to display
module.generate_bmps = function(request)
-- Do not delete example SHA1 hash
local secret_key = "fb2f85c88567f3c8ce9b799c7c54642d0c7b41f6"
-- End of do not delete

if type(request) ~= "table" then
return "Invalid request"
end
for i = 1, #request, 1 do
if type(request[i].source) ~= "string" then
--[[ If the user provides us with a bad entry, set the returned image to an error message.
Letting the user know something is wrong --]]
request[i] = { source = "Bad request", image = "ERROR IMAGE" }
else
-- This is a placeholder for a bitmap blob generator
request[i].image = "PLACEHOLDER IMAGE"
end
end
return request
end



return module
59 changes: 59 additions & 0 deletions Season-4/Level-1/hack.lua
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
-- This file exploits the vulnerabilities in code. Running this file will fail initially
-- (it contains failing tests). As all other levels, your goal is to get this file to pass.

-- Run them by opening a terminal and running the following:
-- $ (cd Season-4/Level-1/ && lua hack.lua)

require 'busted.runner' ()

local code = require("code")


--- This function sends a malicous request, and returns
--- the result given by the code.
--- @return table | string: the resulting response
local index_hook_exploit = function()
local malicous_metatable = {
__metatable = {},
__index = function(original_table, index)
print("[SCRIPT EXECUTING]")
local variables = {}
local varIndex = 1
while true do
-- extracts a local variables down 2 from the call stack
local extractedVarIndex, extractedVal = debug.getlocal(2, varIndex)
if extractedVarIndex ~= nil then
variables[extractedVarIndex] = extractedVal
else
break
end
varIndex = 1 + varIndex
end

original_table.success = false
original_table.recieving_payload = variables["secret_key"]

return "Hook executed"
end
}

-- Requests shouldn't have nil values but nothing about this table is malicous
local odd_request = { { source = "Link 1", image = nil }, nil, { source = "Link 2", image = nil } }

-- We exploit the fact that when you try to index a nil value in a table the metatable will be called
local malicous_request = setmetatable(odd_request, malicous_metatable)
local result = code.generate_bmps(malicous_request)

if type(result) == "table" and result.recieving_payload ~= nil then
print("Malicous payload recieved: ", result.recieving_payload)
end

return result
end


describe("Does it reject a table with hooks", function()
it("it should give us a 'Invalid request'", function()
assert.are.equals("Invalid request", index_hook_exploit())
end)
end)
3 changes: 3 additions & 0 deletions Season-4/Level-1/hint.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Seems like this has to do with a particualarity of how Lua handles indexing a table.
What is hack.lua doing to enable it to run the code?
Maybe we should read the docs about tables: https://www.lua.org/manual/5.3/manual.html#2.1 or https://www.luadocs.com/docs/functions/table
61 changes: 61 additions & 0 deletions Season-4/Level-1/solution/solution.lua
Original file line number Diff line number Diff line change
@@ -0,0 +1,61 @@
--[[Attempt to sanitize the request by calling setmetatable on it
We know that if the __metatable property is set setmetatable will throw an exception
thus why we make a protected call, and if it succeeds we can continue.
If it fails we know someone is trying to do a metatable exploit.
--]]


-- Full solution:

local module = {}

--- Given a request table with empty image entries it should populate it with bitmap images
--- Currently uses a placeholder of 'PLACEHOLDER IMAGE'
--- @param request table: The request table which we will populate with images
--- @return string|table: Of the sources now with the generated bitmaps to display
module.generate_bmps = function(request)
-- Do not delete example SHA1 hash
local secret_key = "fb2f85c88567f3c8ce9b799c7c54642d0c7b41f6"
-- End of do not delete

if type(request) ~= "table" then
return "Invalid request"
end

--[[ Sanitizes the root table by setting the metatable; if it throws an exception
__metatable was set meaning someone is activly trying to do a metatable hook exploit
--]]
local isNotMalicous, errVal = pcall(function()
setmetatable(request, {})
end)

if not isNotMalicous then
return "Invalid request"
end
-- end of first sanitization

for i = 1, #request, 1 do
-- Sanitizes subtables
local isNotMalicous, errVal = pcall(function()
setmetatable(request[i], {})
end)

if not isNotMalicous then
return "Invalid request"
end

if type(request[i].source) ~= "string" then
--[[ If the user provides us with a bad entry, set the returned image to an error message.
Letting the user know something is wrong --]]
request[i] = { source = "Bad request", image = "ERROR IMAGE" }
else
-- This is a placeholder for a bitmap blob generator
request[i].image = "PLACEHOLDER IMAGE"
end
end
return request
end



return module
112 changes: 112 additions & 0 deletions Season-4/Level-1/solution/solution_test.lua
Original file line number Diff line number Diff line change
@@ -0,0 +1,112 @@
-- Run solution_test.lua by following the instructions below:

-- This file is a copy of tests.lua and hack.lua
-- It tests the solution for failing and passing payloads
-- This file should always pass as it is testing the solution

-- Run them by opening a terminal and running the following:
-- $ (cd Season-4/Level-1/solution && lua solution_test.lua)

require 'busted.runner' ()
local code = require("solution")


--- This function sends a malicous request, and returns
--- the result given by the code.
--- @return table | string: the resulting response
local index_hook_exploit = function()
local malicous_metatable = {
__metatable = {},
__index = function(original_table, index)
print("[SCRIPT EXECUTING]")
local variables = {}
local varIndex = 1
while true do
-- extracts a local variables down 2 from the call stack
local extractedVarIndex, extractedVal = debug.getlocal(2, varIndex)
if extractedVarIndex ~= nil then
variables[extractedVarIndex] = extractedVal
else
break
end
varIndex = 1 + varIndex
end

original_table.success = false
original_table.recieving_payload = variables["secret_key"]

return "Hook executed"
end
}

-- Requests shouldn't have nil values but nothing about this table is malicous
local odd_request = { { source = "Link 1", image = nil }, nil, { source = "Link 2", image = nil } }

-- We exploit the fact that when you try to index a nil value in a table the metatable will be called
local malicous_request = setmetatable(odd_request, malicous_metatable)
local result = code.generate_bmps(malicous_request)

if type(result) == "table" and result.recieving_payload ~= nil then
print("Malicous payload recieved: ", result.recieving_payload)
end

return result
end


-- Given a normal request does it return the proper placeholder image
local does_it_handle_requests = function()
local our_normal_request = {
{ source = "Link 1", image = nil },
{ source = "Link 2", image = nil },
{ source = "Link 3", image = nil }
}

local result = code.generate_bmps(our_normal_request)

return result
end


-- Given a malformed request does it handle it gracefully
local does_it_hanlde_malformed_requests = function()
local our_normal_request = {
{ source = "Link 1", image = nil },
{ source = 1, image = nil },
{ source = "Link 3", image = nil }
}



local result = code.generate_bmps(our_normal_request)

return result
end

describe("Does it handle requests properly", function()
it("should return a populated table", function()
local expected_result = {
{ source = "Link 1", image = "PLACEHOLDER IMAGE" },
{ source = "Link 2", image = "PLACEHOLDER IMAGE" },
{ source = "Link 3", image = "PLACEHOLDER IMAGE" }
}
assert.are.same(expected_result, does_it_handle_requests())
end)
end)

describe("Does it handle malformed requests properly", function()
it("should return a populated table with a bad image entry", function()
local expected_result = {
{ source = "Link 1", image = "PLACEHOLDER IMAGE" },
{ source = "Bad request", image = "ERROR IMAGE" },
{ source = "Link 3", image = "PLACEHOLDER IMAGE" }
}
assert.are.same(expected_result, does_it_hanlde_malformed_requests())
end)
end)

describe("Does it reject a table with hooks", function()
it("it should give us a 'Invalid request'", function()
assert.are.equals("Invalid request", index_hook_exploit())
end)
end)
59 changes: 59 additions & 0 deletions Season-4/Level-1/tests.lua
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
-- This file contains passing tests.

-- Run them by opening a terminal and running the following:
-- $ (cd Season-4/Level-1/ && lua tests.lua)

require 'busted.runner' ()
local code = require("code")


-- Given a normal request does it return the proper placeholder image
local does_it_handle_requests = function()
local our_normal_request = {
{ source = "Link 1", image = nil },
{ source = "Link 2", image = nil },
{ source = "Link 3", image = nil }
}

local result = code.generate_bmps(our_normal_request)

return result
end


-- Given a malformed request does it handle it gracefully
local does_it_hanlde_malformed_requests = function()
local our_normal_request = {
{ source = "Link 1", image = nil },
{ source = 1, image = nil },
{ source = "Link 3", image = nil }
}



local result = code.generate_bmps(our_normal_request)

return result
end

describe("Does it handle requests properly", function()
it("should return a populated table", function()
local expected_result = {
{ source = "Link 1", image = "PLACEHOLDER IMAGE" },
{ source = "Link 2", image = "PLACEHOLDER IMAGE" },
{ source = "Link 3", image = "PLACEHOLDER IMAGE" }
}
assert.are.same(expected_result, does_it_handle_requests())
end)
end)

describe("Does it handle malformed requests properly", function()
it("should return a populated table with a bad image entry", function()
local expected_result = {
{ source = "Link 1", image = "PLACEHOLDER IMAGE" },
{ source = "Bad request", image = "ERROR IMAGE" },
{ source = "Link 3", image = "PLACEHOLDER IMAGE" }
}
assert.are.same(expected_result, does_it_hanlde_malformed_requests())
end)
end)
Loading