支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: fd1ecf54a80807b2cf76b4cf8f4709493a2199fd

来源
关联漏洞
标题:SockJS 输入验证错误漏洞 (CVE-2020-7693)
描述:SockJS是一款浏览器JavaScript库。 SockJS 0.3.20之前版本中存在安全漏洞,该漏洞源于程序没有正确处理Upgrade标头。攻击者可利用该漏洞导致托管sockjs应用程序的容器崩溃。
描述
CVE-2020-7693: SockJS 0.3.19 Denial of Service POC
介绍
# CVE-2020-7693: Meteor <1.10.2 SockJS 0.3.19 Denial of Service POC
### Author: Andrew Snow

[SockJS v0.3.19](https://github.com/sockjs/sockjs-node/issues/252) calls `res.end` instead of `res.write` when receiving websocket upgrade requests. This causes an `Error [ERR_STREAM_WRITE_AFTER_END]: write after end` which crashes the container running the app utilising the vulnerable SockJS.

Vulnerable versions affected:
* Meteor JS <1.10.2 which use SockJS 0.3.19
* SockJS 0.3.19

## Usage
This POC is targeted towards vulnerable MeteorJS apps running SockJS on `/sockjs`. To customise for other web apps running SockJS, change the payloads from `/sockjs` to corresponding routes managed by SockJS.

Install Python, then run in cmd/terminal:
```
pip install requests
python poc.py --target <domain>
```

A demo Meteor app running the vulnerable sockjs has been included. To test the exploit on this demo app, install Meteor from https://www.meteor.com/install and then:
```
cd demo/
meteor
```

And then point the payload target to `http://localhost:3000`

## Remediation
Update SockJS to 0.3.20

## References & CVE
* https://snyk.io/vuln/SNYK-JS-SOCKJS-575261
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7693
* https://cwe.mitre.org/data/definitions/400.html
文件快照

[4.0K] /data/pocs/fd1ecf54a80807b2cf76b4cf8f4709493a2199fd ├── [4.0K] demo │   ├── [4.0K] client │   │   ├── [ 53] main.css │   │   ├── [ 638] main.html │   │   └── [ 511] main.js │   ├── [ 586] package.json │   ├── [ 15K] package-lock.json │   ├── [4.0K] server │   │   └── [ 106] main.js │   └── [4.0K] tests │   └── [ 487] main.js ├── [ 34K] LICENSE ├── [1.5K] poc.py └── [1.2K] README.md 4 directories, 10 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。