Skip to content
Posted by
By
king
1.描述
- Apache Shiro <=1.2.4
- 一个Java反序列化漏洞
2.原理
- 加密的用户信息序列化后存储在名为remember-me的Cookie中,攻击者可以使用Shiro的默认密钥伪造用户Cookie,触发Java反序列化漏洞,进而在目标机器上执行任意命令
3.POC
- poc.py
- import requests
url = “http://192.168.76.138:8080/login”
headers = {
“Cookie”: “rememberMe=1”
}
res = requests.get(url,headers=headers)
try:
poc = “rememberMe=deleteMe” in res.headers[‘Set-Cookie’]
if poc:
print(“CVE-2016-4437 is exist!”)
except:
print(“CVE-2016-4437 is not exist!”)
4.EXP
- 将rememberMe的值改为加密后的反弹shell的命令,可获得root的shell
Scroll to Top