Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-3241 PoC — Oracle Java SE,Java SE Embedded和Jrockit 输入验证错误漏洞

Source
Associated Vulnerability
Title:Oracle Java SE,Java SE Embedded和Jrockit 输入验证错误漏洞 (CVE-2017-3241)
Description:Oracle Java SE等都是美国甲骨文(Oracle)公司的产品。Oracle Java SE是一款用于开发和部署桌面、服务器以及嵌入设备和实时环境中的Java应用程序。Oracle Java SE Embedded是一款针对嵌入式系统的、可移植的应用程序的Java平台。Oracle Jrockit是一款内置于Oracle融合中间件中的Java虚拟机。 Oracle Java SE中的Java SE、Java SE Embedded和JRockit组件的RMI子组件存在安全漏洞。攻击者可利用该漏洞控
Description
POC for java RMI deserialization vulnerability
Readme
# CVE-2017-3241-POC
POC for java RMI deserialization vulnerability

You probably need to use JDK 8 to run this poc.

Just pay attention to Message class in both client and server side. They are different. And the difference is the key to understand this vulnerability.

The fix Oracle published is to have developer configure a deserialization white/black list in java security policy. I would say, how many developer would know that list exist until they got hacked?

I thought to write a testing program, but I am lazy.. if you understand my code, can easily write your own. I suggest you use java instrument or reflection.

and Remote code execution is possible if some classes exist in target classpath:

http://seclist.us/proof-of-concept-exploit-showing-how-to-do-bytecode-injection-through-untrusted-deserialization.html

https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf

http://www.freebuf.com/vuls/126499.html

This program is for Educational and test purpose ONLY. Do not use it without permission. Do not use it for malicious purpose. The usual disclaimer applies, especially the fact that me is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using this program you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not my's responsibility.
File Snapshot

[4.0K] /data/pocs/11831fc8a22b1f3ff8653a5c2be69c54c133a3dd ├── [1.6K] README.md └── [ 18K] SourceCode.zip 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.