For security reasons, we now only accept image files!

Its the same image upload thing as last time, atleast the front end looks the same

Solving it:
I thought, this is easy just change the filename from natas12.jpg to natas12.php.jpg. But this gives an error: File is not an image

So lets have a look at the source code:

<!-- This stuff in the header has nothing to do with the level -->
<link rel="stylesheet" type="text/css" href="">
<link rel="stylesheet" href="" />
<link rel="stylesheet" href="" />
<script src=""></script>
<script src=""></script>
<script src=></script><script src=""></script>
<script>var wechallinfo = { "level": "natas13", "pass": "<censored>" };</script></head>
<div id="content">
For security reasons, we now only accept image files!<br/><br/>


function genRandomString() {
    $length = 10;
    $characters = "0123456789abcdefghijklmnopqrstuvwxyz";
    $string = "";    

    for ($p = 0; $p < $length; $p++) {
        $string .= $characters[mt_rand(0, strlen($characters)-1)];

    return $string;

function makeRandomPath($dir, $ext) {
    do {
    $path = $dir."/".genRandomString().".".$ext;
    } while(file_exists($path));
    return $path;

function makeRandomPathFromFilename($dir, $fn) {
    $ext = pathinfo($fn, PATHINFO_EXTENSION);
    return makeRandomPath($dir, $ext);

if(array_key_exists("filename", $_POST)) {
    $target_path = makeRandomPathFromFilename("upload", $_POST["filename"]);
        if($err === 2){
            echo "The uploaded file exceeds MAX_FILE_SIZE";
        } else{
            echo "Something went wrong :/";
    } else if(filesize($_FILES['uploadedfile']['tmp_name']) > 1000) {
        echo "File is too big";
    } else if (! exif_imagetype($_FILES['uploadedfile']['tmp_name'])) {
        echo "File is not an image";
    } else {
        if(move_uploaded_file($_FILES['uploadedfile']['tmp_name'], $target_path)) {
            echo "The file <a href=\"$target_path\">$target_path</a> has been uploaded";
        } else{
            echo "There was an error uploading the file, please try again!";
} else {

<form enctype="multipart/form-data" action="index.php" method="POST">
<input type="hidden" name="MAX_FILE_SIZE" value="1000" />
<input type="hidden" name="filename" value="<? print genRandomString(); ?>.jpg" />
Choose a JPEG to upload (max 1KB):<br/>
<input name="uploadedfile" type="file" /><br />
<input type="submit" value="Upload File" />
<? } ?>
<div id="viewsource"><a href="index-source.html">View sourcecode</a></div>

It seems that it uses exif_imagetype to check if it is an image file. Lets see if we can bypass this method/function. I came to a python solution from AlessandraZullo. Downloaded the webshell.php, uploaded this and we have it. It uploaded but still as an .jpg. So lets check the html source code again, and the same hidden field is there. Lets change .jpg to .php and reupload the file, follow the link and we came to the following webpage:

Knowing the webshell he used we need to use ?cmd= <command> after the url and change the <command> to what we want to execute. So lets try ?cmd=echo “hello” to test it out. And it works:

Lets cat the natas14 file in the /etc directory with: cat /etc/natas_webpass/natas14. We found the password to natas14.

Leave a Reply

Your email address will not be published. Required fields are marked *