关联漏洞
Description
CVE-2020-4464 / CVE-2020-4450
介绍
WSIF Gadget for WebSphere (CVE-2020-4464 / CVE-2020-4450)
=========================================================
This is based on the excellent blog posts of ZDI (original report by [@\_tint0](https://twitter.com/_tint0)):
* https://www.thezdi.com/blog/2020/7/20/abusing-java-remote-protocols-in-ibm-websphere
* https://www.zerodayinitiative.com/blog/2020/9/29/exploiting-other-remote-protocols-in-ibm-websphere
... and the work of some fine Chinese hackers (I couldn't determine the true source for the code, feel free to open an Issue if you think you deserve credit):
* https://paper.seebug.org/1315/
* https://vlambda.com/wz_7iyDatDUdvs.html
* https://cert.360.cn/report/detail?id=3d016bdef66b8e29936f8cb364f265c8
My additions (not much, really):
* Dependencies + build script
* Publicly accessible RMI service
* Little code cleanup
[FoxGlove's code](https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/) is pulled in as a submodule, you can use the WebSphere request file to trigger CVE-2020-4464.
You should copy the `plugins` and `runtimes` directories from WebSphere to the `lib` directory, then run `ant` to compile!
To run (Java 11):
```
java -cp .:runtimes/com.ibm.ws.orb_9.0.jar:runtimes/com.ibm.ws.admin.client_9.0.jar:plugins/com.ibm.ws.managedobject.jar:plugins/com.ibm.ws.runtime.jar:plugins/com.ibm.ws.batch.runtime.jar:plugins/javax.j2ee.ejb.jar:runtimes/com.ibm.jaxws.thinclient_9.0.jar --add-modules jdk.naming.rmi --add-exports='jdk.naming.rmi/com.sun.jndi.rmi.registry=ALL-UNNAMED' Test
```
```
java -cp .:plugins/com.ibm.ws.runtime.jar:runtimes/com.ibm.ws.admin.client_9.0.jar RMIServer
```
文件快照
[4.0K] /data/pocs/cd0c4abdd9da6eddb2cd8e3f369f5581ba36ec35
├── [1.4K] build.xml
├── [4.0K] JavaUnserializeExploits
├── [4.0K] lib
│ ├── [4.0K] plugins
│ │ └── [ 0] _COPY_FROM_WEBSPHERE_
│ └── [4.0K] runtimes
│ └── [ 0] _COPY_FROM_WEBSPHERE_
├── [1.7K] README.md
├── [4.0K] resource
│ └── [1.7K] poc.wsdl
└── [4.0K] src
├── [1.3K] RMIServer.java
└── [2.7K] Test.java
6 directories, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。