mirror of
https://github.com/Medicean/VulApps.git
synced 2025-05-09 03:56:39 +00:00
(Add Vul: SSH) SSH 命令注入漏洞(CVE-2017-1000117)
This commit is contained in:
parent
4b35af325c
commit
707a6f988a
@ -111,6 +111,7 @@ docker run -d -p 80:8080 medicean/vulapps:s_struts2_s2-037
|
|||||||
|
|
||||||
* [Samba](./s/samba/)
|
* [Samba](./s/samba/)
|
||||||
* [Shiro](./s/shiro/)
|
* [Shiro](./s/shiro/)
|
||||||
|
* [SSH](./s/ssh/)
|
||||||
* [Spring Boot](./s/springboot/)
|
* [Spring Boot](./s/springboot/)
|
||||||
* [Struts2](./s/struts2/)
|
* [Struts2](./s/struts2/)
|
||||||
* [Spring WebFlow](./s/springwebflow/)
|
* [Spring WebFlow](./s/springwebflow/)
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
|
|
||||||
* [Samba](./samba/)
|
* [Samba](./samba/)
|
||||||
* [Shiro](./shiro/)
|
* [Shiro](./shiro/)
|
||||||
|
* [SSH](./ssh/)
|
||||||
* [Spring Boot](./springboot/)
|
* [Spring Boot](./springboot/)
|
||||||
* [Struts2](./struts2/)
|
* [Struts2](./struts2/)
|
||||||
* [Spring WebFlow](./springwebflow/)
|
* [Spring WebFlow](./springwebflow/)
|
||||||
|
15
s/ssh/1/Dockerfile
Normal file
15
s/ssh/1/Dockerfile
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
FROM medicean/vulapps:base_lamp
|
||||||
|
|
||||||
|
RUN set -x \
|
||||||
|
&& apt-get update \
|
||||||
|
&& apt-get install -y git=1:1.9.1-1 \
|
||||||
|
&& rm -rf /var/www/html/* \
|
||||||
|
&& mkdir -p /var/www/html/repos
|
||||||
|
|
||||||
|
COPY src/apache2.conf /etc/apache2/apache2.conf
|
||||||
|
COPY src/index.php /var/www/html/index.php
|
||||||
|
|
||||||
|
RUN chown -R www-data:www-data /var/www/html
|
||||||
|
|
||||||
|
EXPOSE 80
|
||||||
|
CMD ["/start.sh"]
|
69
s/ssh/1/README.md
Normal file
69
s/ssh/1/README.md
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
## SSH 命令注入漏洞(CVE-2017-1000117)
|
||||||
|
|
||||||
|
### 漏洞信息
|
||||||
|
|
||||||
|
恶意人员可以通过巧妙构造 `ssh://…` 链接,让受害人在执行程序等情况下访问该恶意链接,从而达到命令执行的目的。
|
||||||
|
|
||||||
|
### 影响范围
|
||||||
|
|
||||||
|
#### 修复版本
|
||||||
|
|
||||||
|
* Git v2.14.1、2.7.6、v2.8.6、v2.9.5、v2.10.4、v2.11.3、v2.12.4 和 v2.13.5
|
||||||
|
|
||||||
|
### 镜像信息
|
||||||
|
|
||||||
|
类型 | 值
|
||||||
|
:-:|:-:
|
||||||
|
Git | 1.9.1
|
||||||
|
HTTP 端口 | 80
|
||||||
|
镜像 tag | `s_ssh_1`
|
||||||
|
|
||||||
|
### 获取环境:
|
||||||
|
|
||||||
|
1. 拉取镜像到本地
|
||||||
|
|
||||||
|
```
|
||||||
|
$ docker pull medicean/vulapps:s_ssh_1
|
||||||
|
```
|
||||||
|
|
||||||
|
2. 启动环境
|
||||||
|
|
||||||
|
```
|
||||||
|
$ docker run -d -p 8000:80 medicean/vulapps:s_ssh_1
|
||||||
|
```
|
||||||
|
> `-p 8000:80` 前面的 8000 代表物理机的端口,可随意指定。
|
||||||
|
|
||||||
|
访问 http://127.0.0.1:8000
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
本环境中,模拟了远程导入仓库的情景。在该场景下攻击者可远程执行命令。配合本环境所使用的远程 PoC 仓库为:[https://github.com/VulApps/CVE-2017-1000117.git](https://github.com/VulApps/CVE-2017-1000117.git)
|
||||||
|
|
||||||
|
1. 修改并提交远程 PoC 仓库的 [payload](https://github.com/VulApps/CVE-2017-1000117/blob/master/payload) 文件,内容为将要执行的命令
|
||||||
|
|
||||||
|
本例中执行的命令为:
|
||||||
|
|
||||||
|
```
|
||||||
|
id > /var/www/html/vul
|
||||||
|
```
|
||||||
|
|
||||||
|
> 若命令执行成功,则会在 `/var/www/html` 目录下生成 `vul` 文件,内容为 `id` 命令的执行结果(实际使用时可直接反弹 Shell)
|
||||||
|
|
||||||
|
|
||||||
|
2. 访问目标页面,并填写要 import 的仓库地址
|
||||||
|
|
||||||
|
> 假如目标地址为: http://127.0.0.1:32774/
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. 点击 import 之后,访问 `http://127.0.0.1:32774/vul`,看到执行结果
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### 相关链接
|
||||||
|
|
||||||
|
* [VulApps/CVE-2017-1000117](https://github.com/VulApps/CVE-2017-1000117.git)
|
||||||
|
* [SSH 命令注入漏洞(CVE-2017-1000117)分析](http://bobao.360.cn/learning/detail/4244.html)
|
||||||
|
* [多款主流版本控制系统被曝存在客户端任意代码执行漏洞](http://m.bobao.360.cn/news/detail/4260.html)
|
||||||
|
* [A PoC Repository for CVE-2017-1000117](https://gitlab.com/joernchen/CVE-2017-1000117)
|
||||||
|
* [CVE-2017-1000117 - PoCs](https://github.com/Manouchehri/CVE-2017-1000117)
|
BIN
s/ssh/1/poc-1.png
Normal file
BIN
s/ssh/1/poc-1.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 55 KiB |
BIN
s/ssh/1/poc-2.png
Normal file
BIN
s/ssh/1/poc-2.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 27 KiB |
228
s/ssh/1/src/apache2.conf
Normal file
228
s/ssh/1/src/apache2.conf
Normal file
@ -0,0 +1,228 @@
|
|||||||
|
# This is the main Apache server configuration file. It contains the
|
||||||
|
# configuration directives that give the server its instructions.
|
||||||
|
# See http://httpd.apache.org/docs/2.4/ for detailed information about
|
||||||
|
# the directives and /usr/share/doc/apache2/README.Debian about Debian specific
|
||||||
|
# hints.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Summary of how the Apache 2 configuration works in Debian:
|
||||||
|
# The Apache 2 web server configuration in Debian is quite different to
|
||||||
|
# upstream's suggested way to configure the web server. This is because Debian's
|
||||||
|
# default Apache2 installation attempts to make adding and removing modules,
|
||||||
|
# virtual hosts, and extra configuration directives as flexible as possible, in
|
||||||
|
# order to make automating the changes and administering the server as easy as
|
||||||
|
# possible.
|
||||||
|
|
||||||
|
# It is split into several files forming the configuration hierarchy outlined
|
||||||
|
# below, all located in the /etc/apache2/ directory:
|
||||||
|
#
|
||||||
|
# /etc/apache2/
|
||||||
|
# |-- apache2.conf
|
||||||
|
# | `-- ports.conf
|
||||||
|
# |-- mods-enabled
|
||||||
|
# | |-- *.load
|
||||||
|
# | `-- *.conf
|
||||||
|
# |-- conf-enabled
|
||||||
|
# | `-- *.conf
|
||||||
|
# `-- sites-enabled
|
||||||
|
# `-- *.conf
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# * apache2.conf is the main configuration file (this file). It puts the pieces
|
||||||
|
# together by including all remaining configuration files when starting up the
|
||||||
|
# web server.
|
||||||
|
#
|
||||||
|
# * ports.conf is always included from the main configuration file. It is
|
||||||
|
# supposed to determine listening ports for incoming connections which can be
|
||||||
|
# customized anytime.
|
||||||
|
#
|
||||||
|
# * Configuration files in the mods-enabled/, conf-enabled/ and sites-enabled/
|
||||||
|
# directories contain particular configuration snippets which manage modules,
|
||||||
|
# global configuration fragments, or virtual host configurations,
|
||||||
|
# respectively.
|
||||||
|
#
|
||||||
|
# They are activated by symlinking available configuration files from their
|
||||||
|
# respective *-available/ counterparts. These should be managed by using our
|
||||||
|
# helpers a2enmod/a2dismod, a2ensite/a2dissite and a2enconf/a2disconf. See
|
||||||
|
# their respective man pages for detailed information.
|
||||||
|
#
|
||||||
|
# * The binary is called apache2. Due to the use of environment variables, in
|
||||||
|
# the default configuration, apache2 needs to be started/stopped with
|
||||||
|
# /etc/init.d/apache2 or apache2ctl. Calling /usr/bin/apache2 directly will not
|
||||||
|
# work with the default configuration.
|
||||||
|
|
||||||
|
|
||||||
|
# Global configuration
|
||||||
|
#
|
||||||
|
|
||||||
|
#
|
||||||
|
# ServerRoot: The top of the directory tree under which the server's
|
||||||
|
# configuration, error, and log files are kept.
|
||||||
|
#
|
||||||
|
# NOTE! If you intend to place this on an NFS (or otherwise network)
|
||||||
|
# mounted filesystem then please read the Mutex documentation (available
|
||||||
|
# at <URL:http://httpd.apache.org/docs/2.4/mod/core.html#mutex>);
|
||||||
|
# you will save yourself a lot of trouble.
|
||||||
|
#
|
||||||
|
# Do NOT add a slash at the end of the directory path.
|
||||||
|
#
|
||||||
|
#ServerRoot "/etc/apache2"
|
||||||
|
|
||||||
|
#
|
||||||
|
# The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
|
||||||
|
#
|
||||||
|
Mutex file:${APACHE_LOCK_DIR} default
|
||||||
|
|
||||||
|
#
|
||||||
|
# PidFile: The file in which the server should record its process
|
||||||
|
# identification number when it starts.
|
||||||
|
# This needs to be set in /etc/apache2/envvars
|
||||||
|
#
|
||||||
|
PidFile ${APACHE_PID_FILE}
|
||||||
|
|
||||||
|
#
|
||||||
|
# Timeout: The number of seconds before receives and sends time out.
|
||||||
|
#
|
||||||
|
Timeout 300
|
||||||
|
|
||||||
|
#
|
||||||
|
# KeepAlive: Whether or not to allow persistent connections (more than
|
||||||
|
# one request per connection). Set to "Off" to deactivate.
|
||||||
|
#
|
||||||
|
KeepAlive On
|
||||||
|
|
||||||
|
#
|
||||||
|
# MaxKeepAliveRequests: The maximum number of requests to allow
|
||||||
|
# during a persistent connection. Set to 0 to allow an unlimited amount.
|
||||||
|
# We recommend you leave this number high, for maximum performance.
|
||||||
|
#
|
||||||
|
MaxKeepAliveRequests 100
|
||||||
|
|
||||||
|
#
|
||||||
|
# KeepAliveTimeout: Number of seconds to wait for the next request from the
|
||||||
|
# same client on the same connection.
|
||||||
|
#
|
||||||
|
KeepAliveTimeout 5
|
||||||
|
|
||||||
|
|
||||||
|
# These need to be set in /etc/apache2/envvars
|
||||||
|
User ${APACHE_RUN_USER}
|
||||||
|
Group ${APACHE_RUN_GROUP}
|
||||||
|
|
||||||
|
#
|
||||||
|
# HostnameLookups: Log the names of clients or just their IP addresses
|
||||||
|
# e.g., www.apache.org (on) or 204.62.129.132 (off).
|
||||||
|
# The default is off because it'd be overall better for the net if people
|
||||||
|
# had to knowingly turn this feature on, since enabling it means that
|
||||||
|
# each client request will result in AT LEAST one lookup request to the
|
||||||
|
# nameserver.
|
||||||
|
#
|
||||||
|
HostnameLookups Off
|
||||||
|
|
||||||
|
# ErrorLog: The location of the error log file.
|
||||||
|
# If you do not specify an ErrorLog directive within a <VirtualHost>
|
||||||
|
# container, error messages relating to that virtual host will be
|
||||||
|
# logged here. If you *do* define an error logfile for a <VirtualHost>
|
||||||
|
# container, that host's errors will be logged there and not here.
|
||||||
|
#
|
||||||
|
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||||
|
|
||||||
|
#
|
||||||
|
# LogLevel: Control the severity of messages logged to the error_log.
|
||||||
|
# Available values: trace8, ..., trace1, debug, info, notice, warn,
|
||||||
|
# error, crit, alert, emerg.
|
||||||
|
# It is also possible to configure the log level for particular modules, e.g.
|
||||||
|
# "LogLevel info ssl:warn"
|
||||||
|
#
|
||||||
|
LogLevel warn
|
||||||
|
|
||||||
|
# Include module configuration:
|
||||||
|
IncludeOptional mods-enabled/*.load
|
||||||
|
IncludeOptional mods-enabled/*.conf
|
||||||
|
|
||||||
|
# Include list of ports to listen on
|
||||||
|
Include ports.conf
|
||||||
|
|
||||||
|
|
||||||
|
# Sets the default security model of the Apache2 HTTPD server. It does
|
||||||
|
# not allow access to the root filesystem outside of /usr/share and /var/www.
|
||||||
|
# The former is used by web applications packaged in Debian,
|
||||||
|
# the latter may be used for local directories served by the web server. If
|
||||||
|
# your system is serving content from a sub-directory in /srv you must allow
|
||||||
|
# access here, or in any related virtual host.
|
||||||
|
<Directory />
|
||||||
|
Options FollowSymLinks
|
||||||
|
AllowOverride None
|
||||||
|
Require all denied
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
<Directory /usr/share>
|
||||||
|
AllowOverride None
|
||||||
|
Require all granted
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
<Directory /var/www/>
|
||||||
|
Options Indexes FollowSymLinks
|
||||||
|
AllowOverride None
|
||||||
|
Require all granted
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
#<Directory /srv/>
|
||||||
|
# Options Indexes FollowSymLinks
|
||||||
|
# AllowOverride None
|
||||||
|
# Require all granted
|
||||||
|
#</Directory>
|
||||||
|
<Directory "/var/www/html/repos">
|
||||||
|
Options Indexes FollowSymLinks
|
||||||
|
<FilesMatch "\.(?i:php|php3|php4|php5)$">
|
||||||
|
SetHandler application/x-httpd-php-source
|
||||||
|
Order Deny,Allow
|
||||||
|
Allow from all
|
||||||
|
</FilesMatch>
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# AccessFileName: The name of the file to look for in each directory
|
||||||
|
# for additional configuration directives. See also the AllowOverride
|
||||||
|
# directive.
|
||||||
|
#
|
||||||
|
AccessFileName .htaccess
|
||||||
|
|
||||||
|
#
|
||||||
|
# The following lines prevent .htaccess and .htpasswd files from being
|
||||||
|
# viewed by Web clients.
|
||||||
|
#
|
||||||
|
<FilesMatch "^\.ht">
|
||||||
|
Require all denied
|
||||||
|
</FilesMatch>
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# The following directives define some format nicknames for use with
|
||||||
|
# a CustomLog directive.
|
||||||
|
#
|
||||||
|
# These deviate from the Common Log Format definitions in that they use %O
|
||||||
|
# (the actual bytes sent including headers) instead of %b (the size of the
|
||||||
|
# requested file), because the latter makes it impossible to detect partial
|
||||||
|
# requests.
|
||||||
|
#
|
||||||
|
# Note that the use of %{X-Forwarded-For}i instead of %h is not recommended.
|
||||||
|
# Use mod_remoteip instead.
|
||||||
|
#
|
||||||
|
LogFormat "%v:%p %h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" vhost_combined
|
||||||
|
LogFormat "%h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" combined
|
||||||
|
LogFormat "%h %l %u %t \"%r\" %>s %O" common
|
||||||
|
LogFormat "%{Referer}i -> %U" referer
|
||||||
|
LogFormat "%{User-agent}i" agent
|
||||||
|
|
||||||
|
# Include of directories ignores editors' and dpkg's backup files,
|
||||||
|
# see README.Debian for details.
|
||||||
|
|
||||||
|
# Include generic snippets of statements
|
||||||
|
IncludeOptional conf-enabled/*.conf
|
||||||
|
|
||||||
|
# Include the virtual host configurations:
|
||||||
|
IncludeOptional sites-enabled/*.conf
|
||||||
|
|
||||||
|
# vim: syntax=apache ts=4 sw=4 sts=4 sr noet
|
22
s/ssh/1/src/index.php
Normal file
22
s/ssh/1/src/index.php
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<title>Repository Clone</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<p>CVE-2017-1000117 Demo</p>
|
||||||
|
<form method="post">
|
||||||
|
<label for="repourl">Repository’s clone URL</label><br>
|
||||||
|
<input id="repourl" type="input" name="repourl" placeholder="https://github.com/VulApps/CVE-2017-1000117.git" style="width: 400px;height: 30px;margin-bottom: 10px;margin-top: 10px;"><br/>
|
||||||
|
<input type="submit" value="Submit" />
|
||||||
|
</form>
|
||||||
|
<?php
|
||||||
|
if (isset($_REQUEST['repourl']) && !empty($_REQUEST['repourl'])) {
|
||||||
|
$repourl = escapeshellarg($_REQUEST['repourl']);
|
||||||
|
@chdir("/var/www/html/repos/");
|
||||||
|
shell_exec("git clone --recursive $repourl");
|
||||||
|
echo 'See your project at: <a href="/repos">Repos</a>';
|
||||||
|
}
|
||||||
|
?>
|
||||||
|
</body>
|
||||||
|
</html>
|
4
s/ssh/README.md
Normal file
4
s/ssh/README.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
SSH
|
||||||
|
---
|
||||||
|
|
||||||
|
1. [SSH 命令注入漏洞(CVE-2017-1000117)](./1)
|
Loading…
x
Reference in New Issue
Block a user