(Add Vul: SSH) SSH 命令注入漏洞(CVE-2017-1000117)

This commit is contained in:
Medicean 2017-08-13 02:54:47 +08:00
parent 4b35af325c
commit 707a6f988a
9 changed files with 340 additions and 0 deletions

View File

@ -111,6 +111,7 @@ docker run -d -p 80:8080 medicean/vulapps:s_struts2_s2-037
* [Samba](./s/samba/)
* [Shiro](./s/shiro/)
* [SSH](./s/ssh/)
* [Spring Boot](./s/springboot/)
* [Struts2](./s/struts2/)
* [Spring WebFlow](./s/springwebflow/)

View File

@ -2,6 +2,7 @@
* [Samba](./samba/)
* [Shiro](./shiro/)
* [SSH](./ssh/)
* [Spring Boot](./springboot/)
* [Struts2](./struts2/)
* [Spring WebFlow](./springwebflow/)

15
s/ssh/1/Dockerfile Normal file
View File

@ -0,0 +1,15 @@
FROM medicean/vulapps:base_lamp
RUN set -x \
&& apt-get update \
&& apt-get install -y git=1:1.9.1-1 \
&& rm -rf /var/www/html/* \
&& mkdir -p /var/www/html/repos
COPY src/apache2.conf /etc/apache2/apache2.conf
COPY src/index.php /var/www/html/index.php
RUN chown -R www-data:www-data /var/www/html
EXPOSE 80
CMD ["/start.sh"]

69
s/ssh/1/README.md Normal file
View File

@ -0,0 +1,69 @@
## SSH 命令注入漏洞(CVE-2017-1000117)
### 漏洞信息
恶意人员可以通过巧妙构造 `ssh://…` 链接,让受害人在执行程序等情况下访问该恶意链接,从而达到命令执行的目的。
### 影响范围
#### 修复版本
* Git v2.14.1、2.7.6、v2.8.6、v2.9.5、v2.10.4、v2.11.3、v2.12.4 和 v2.13.5
### 镜像信息
类型 |
:-:|:-:
Git | 1.9.1
HTTP 端口 | 80
镜像 tag | `s_ssh_1`
### 获取环境:
1. 拉取镜像到本地
```
$ docker pull medicean/vulapps:s_ssh_1
```
2. 启动环境
```
$ docker run -d -p 8000:80 medicean/vulapps:s_ssh_1
```
> `-p 8000:80` 前面的 8000 代表物理机的端口,可随意指定。
访问 http://127.0.0.1:8000
### POC
本环境中,模拟了远程导入仓库的情景。在该场景下攻击者可远程执行命令。配合本环境所使用的远程 PoC 仓库为:[https://github.com/VulApps/CVE-2017-1000117.git](https://github.com/VulApps/CVE-2017-1000117.git)
1. 修改并提交远程 PoC 仓库的 [payload](https://github.com/VulApps/CVE-2017-1000117/blob/master/payload) 文件,内容为将要执行的命令
本例中执行的命令为:
```
id > /var/www/html/vul
```
> 若命令执行成功,则会在 `/var/www/html` 目录下生成 `vul` 文件,内容为 `id` 命令的执行结果(实际使用时可直接反弹 Shell)
2. 访问目标页面,并填写要 import 的仓库地址
> 假如目标地址为: http://127.0.0.1:32774/
![](https://github.com/Medicean/VulApps/raw/master/s/ssh/1/poc-1.png)
3. 点击 import 之后,访问 `http://127.0.0.1:32774/vul`,看到执行结果
![](https://github.com/Medicean/VulApps/raw/master/s/ssh/1/poc-2.png)
### 相关链接
* [VulApps/CVE-2017-1000117](https://github.com/VulApps/CVE-2017-1000117.git)
* [SSH 命令注入漏洞(CVE-2017-1000117)分析](http://bobao.360.cn/learning/detail/4244.html)
* [多款主流版本控制系统被曝存在客户端任意代码执行漏洞](http://m.bobao.360.cn/news/detail/4260.html)
* [A PoC Repository for CVE-2017-1000117](https://gitlab.com/joernchen/CVE-2017-1000117)
* [CVE-2017-1000117 - PoCs](https://github.com/Manouchehri/CVE-2017-1000117)

BIN
s/ssh/1/poc-1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 55 KiB

BIN
s/ssh/1/poc-2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 27 KiB

228
s/ssh/1/src/apache2.conf Normal file
View File

@ -0,0 +1,228 @@
# This is the main Apache server configuration file. It contains the
# configuration directives that give the server its instructions.
# See http://httpd.apache.org/docs/2.4/ for detailed information about
# the directives and /usr/share/doc/apache2/README.Debian about Debian specific
# hints.
#
#
# Summary of how the Apache 2 configuration works in Debian:
# The Apache 2 web server configuration in Debian is quite different to
# upstream's suggested way to configure the web server. This is because Debian's
# default Apache2 installation attempts to make adding and removing modules,
# virtual hosts, and extra configuration directives as flexible as possible, in
# order to make automating the changes and administering the server as easy as
# possible.
# It is split into several files forming the configuration hierarchy outlined
# below, all located in the /etc/apache2/ directory:
#
# /etc/apache2/
# |-- apache2.conf
# | `-- ports.conf
# |-- mods-enabled
# | |-- *.load
# | `-- *.conf
# |-- conf-enabled
# | `-- *.conf
# `-- sites-enabled
# `-- *.conf
#
#
# * apache2.conf is the main configuration file (this file). It puts the pieces
# together by including all remaining configuration files when starting up the
# web server.
#
# * ports.conf is always included from the main configuration file. It is
# supposed to determine listening ports for incoming connections which can be
# customized anytime.
#
# * Configuration files in the mods-enabled/, conf-enabled/ and sites-enabled/
# directories contain particular configuration snippets which manage modules,
# global configuration fragments, or virtual host configurations,
# respectively.
#
# They are activated by symlinking available configuration files from their
# respective *-available/ counterparts. These should be managed by using our
# helpers a2enmod/a2dismod, a2ensite/a2dissite and a2enconf/a2disconf. See
# their respective man pages for detailed information.
#
# * The binary is called apache2. Due to the use of environment variables, in
# the default configuration, apache2 needs to be started/stopped with
# /etc/init.d/apache2 or apache2ctl. Calling /usr/bin/apache2 directly will not
# work with the default configuration.
# Global configuration
#
#
# ServerRoot: The top of the directory tree under which the server's
# configuration, error, and log files are kept.
#
# NOTE! If you intend to place this on an NFS (or otherwise network)
# mounted filesystem then please read the Mutex documentation (available
# at <URL:http://httpd.apache.org/docs/2.4/mod/core.html#mutex>);
# you will save yourself a lot of trouble.
#
# Do NOT add a slash at the end of the directory path.
#
#ServerRoot "/etc/apache2"
#
# The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
#
Mutex file:${APACHE_LOCK_DIR} default
#
# PidFile: The file in which the server should record its process
# identification number when it starts.
# This needs to be set in /etc/apache2/envvars
#
PidFile ${APACHE_PID_FILE}
#
# Timeout: The number of seconds before receives and sends time out.
#
Timeout 300
#
# KeepAlive: Whether or not to allow persistent connections (more than
# one request per connection). Set to "Off" to deactivate.
#
KeepAlive On
#
# MaxKeepAliveRequests: The maximum number of requests to allow
# during a persistent connection. Set to 0 to allow an unlimited amount.
# We recommend you leave this number high, for maximum performance.
#
MaxKeepAliveRequests 100
#
# KeepAliveTimeout: Number of seconds to wait for the next request from the
# same client on the same connection.
#
KeepAliveTimeout 5
# These need to be set in /etc/apache2/envvars
User ${APACHE_RUN_USER}
Group ${APACHE_RUN_GROUP}
#
# HostnameLookups: Log the names of clients or just their IP addresses
# e.g., www.apache.org (on) or 204.62.129.132 (off).
# The default is off because it'd be overall better for the net if people
# had to knowingly turn this feature on, since enabling it means that
# each client request will result in AT LEAST one lookup request to the
# nameserver.
#
HostnameLookups Off
# ErrorLog: The location of the error log file.
# If you do not specify an ErrorLog directive within a <VirtualHost>
# container, error messages relating to that virtual host will be
# logged here. If you *do* define an error logfile for a <VirtualHost>
# container, that host's errors will be logged there and not here.
#
ErrorLog ${APACHE_LOG_DIR}/error.log
#
# LogLevel: Control the severity of messages logged to the error_log.
# Available values: trace8, ..., trace1, debug, info, notice, warn,
# error, crit, alert, emerg.
# It is also possible to configure the log level for particular modules, e.g.
# "LogLevel info ssl:warn"
#
LogLevel warn
# Include module configuration:
IncludeOptional mods-enabled/*.load
IncludeOptional mods-enabled/*.conf
# Include list of ports to listen on
Include ports.conf
# Sets the default security model of the Apache2 HTTPD server. It does
# not allow access to the root filesystem outside of /usr/share and /var/www.
# The former is used by web applications packaged in Debian,
# the latter may be used for local directories served by the web server. If
# your system is serving content from a sub-directory in /srv you must allow
# access here, or in any related virtual host.
<Directory />
Options FollowSymLinks
AllowOverride None
Require all denied
</Directory>
<Directory /usr/share>
AllowOverride None
Require all granted
</Directory>
<Directory /var/www/>
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory>
#<Directory /srv/>
# Options Indexes FollowSymLinks
# AllowOverride None
# Require all granted
#</Directory>
<Directory "/var/www/html/repos">
Options Indexes FollowSymLinks
<FilesMatch "\.(?i:php|php3|php4|php5)$">
SetHandler application/x-httpd-php-source
Order Deny,Allow
Allow from all
</FilesMatch>
</Directory>
# AccessFileName: The name of the file to look for in each directory
# for additional configuration directives. See also the AllowOverride
# directive.
#
AccessFileName .htaccess
#
# The following lines prevent .htaccess and .htpasswd files from being
# viewed by Web clients.
#
<FilesMatch "^\.ht">
Require all denied
</FilesMatch>
#
# The following directives define some format nicknames for use with
# a CustomLog directive.
#
# These deviate from the Common Log Format definitions in that they use %O
# (the actual bytes sent including headers) instead of %b (the size of the
# requested file), because the latter makes it impossible to detect partial
# requests.
#
# Note that the use of %{X-Forwarded-For}i instead of %h is not recommended.
# Use mod_remoteip instead.
#
LogFormat "%v:%p %h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" vhost_combined
LogFormat "%h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" combined
LogFormat "%h %l %u %t \"%r\" %>s %O" common
LogFormat "%{Referer}i -> %U" referer
LogFormat "%{User-agent}i" agent
# Include of directories ignores editors' and dpkg's backup files,
# see README.Debian for details.
# Include generic snippets of statements
IncludeOptional conf-enabled/*.conf
# Include the virtual host configurations:
IncludeOptional sites-enabled/*.conf
# vim: syntax=apache ts=4 sw=4 sts=4 sr noet

22
s/ssh/1/src/index.php Normal file
View File

@ -0,0 +1,22 @@
<html>
<head>
<meta charset="utf-8">
<title>Repository Clone</title>
</head>
<body>
<p>CVE-2017-1000117 Demo</p>
<form method="post">
<label for="repourl">Repositorys clone URL</label><br>
<input id="repourl" type="input" name="repourl" placeholder="https://github.com/VulApps/CVE-2017-1000117.git" style="width: 400px;height: 30px;margin-bottom: 10px;margin-top: 10px;"><br/>
<input type="submit" value="Submit" />
</form>
<?php
if (isset($_REQUEST['repourl']) && !empty($_REQUEST['repourl'])) {
$repourl = escapeshellarg($_REQUEST['repourl']);
@chdir("/var/www/html/repos/");
shell_exec("git clone --recursive $repourl");
echo 'See your project at: <a href="/repos">Repos</a>';
}
?>
</body>
</html>

4
s/ssh/README.md Normal file
View File

@ -0,0 +1,4 @@
SSH
---
1. [SSH 命令注入漏洞(CVE-2017-1000117)](./1)