关联漏洞
标题:Oracle Java SE,Java SE Embedded和Jrockit 输入验证错误漏洞 (CVE-2017-3241)Description:Oracle Java SE等都是美国甲骨文(Oracle)公司的产品。Oracle Java SE是一款用于开发和部署桌面、服务器以及嵌入设备和实时环境中的Java应用程序。Oracle Java SE Embedded是一款针对嵌入式系统的、可移植的应用程序的Java平台。Oracle Jrockit是一款内置于Oracle融合中间件中的Java虚拟机。 Oracle Java SE中的Java SE、Java SE Embedded和JRockit组件的RMI子组件存在安全漏洞。攻击者可利用该漏洞控
Description
POC for java RMI deserialization vulnerability
介绍
# CVE-2017-3241-POC
POC for java RMI deserialization vulnerability
You probably need to use JDK 8 to run this poc.
Just pay attention to Message class in both client and server side. They are different. And the difference is the key to understand this vulnerability.
The fix Oracle published is to have developer configure a deserialization white/black list in java security policy. I would say, how many developer would know that list exist until they got hacked?
I thought to write a testing program, but I am lazy.. if you understand my code, can easily write your own. I suggest you use java instrument or reflection.
and Remote code execution is possible if some classes exist in target classpath:
http://seclist.us/proof-of-concept-exploit-showing-how-to-do-bytecode-injection-through-untrusted-deserialization.html
https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf
http://www.freebuf.com/vuls/126499.html
This program is for Educational and test purpose ONLY. Do not use it without permission. Do not use it for malicious purpose. The usual disclaimer applies, especially the fact that me is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using this program you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not my's responsibility.
文件快照
[4.0K] /data/pocs/11831fc8a22b1f3ff8653a5c2be69c54c133a3dd
├── [1.6K] README.md
└── [ 18K] SourceCode.zip
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。