Openfire漏洞(CVE-2019-18393/18394)

Openfire安装

77@ubuntu129:~/repos$ wget https://github.com/igniterealtime/Openfire/releases/download/v4.4.2/openfire_4.4.2_all.deb
77@ubuntu129:~/repos$ sudo dpkg -i openfire_4.4.2_all.deb 
Selecting previously unselected package openfire.
(Reading database ... 332004 files and directories currently installed.)
Preparing to unpack openfire_4.4.2_all.deb ...
Unpacking openfire (4.4.2) ...
Setting up openfire (4.4.2) ...
adduser: Warning: The home directory `/var/lib/openfire' does not belong to the user you are currently creating.
Processing triggers for ureadahead (0.100.0-21) ...
Processing triggers for systemd (237-3ubuntu10.24) ...
77@ubuntu129:~/repos$ sudo systemctl start openfire.service
77@ubuntu129:~/repos$ tcp|grep 9090
tcp6       0      0 :::9090                 :::*                    LISTEN      28190/java

在WEB界面继续安装:
参考:

  • https://www.vultr.com/docs/how-to-setup-an-openfire-xmpp-server-on-ubuntu-16-04-lts
  • https://computingforgeeks.com/install-openfire-xmpp-chat-server-on-ubuntu-linux/

Openfire漏洞(CVE-2019-18393/18394)_第1张图片

安装完成之后进入这个界面:
Openfire漏洞(CVE-2019-18393/18394)_第2张图片

SSRF:CVE-2019-18394

在这里插入图片描述
/getFavicon对应了FaviconServlet这个类,
进入这个类,其doGet方法里根据用户的host参数,进行http请求。
Openfire漏洞(CVE-2019-18393/18394)_第3张图片
Openfire漏洞(CVE-2019-18393/18394)_第4张图片

xmppserver/src/main/java/org/jivesoftware/util/FaviconServlet.java
Openfire漏洞(CVE-2019-18393/18394)_第5张图片

由于后面跟着/favicon.ico
Openfire漏洞(CVE-2019-18393/18394)_第6张图片
可以用?来讲后面的作为请求参数,而造成任意path的请求。

http://192.168.85.129:9090/getFavicon?host=192.168.85.129:4444/secrets.txt?a=

Openfire漏洞(CVE-2019-18393/18394)_第7张图片

参考

  • https://swarm.ptsecurity.com/openfire-admin-console/

你可能感兴趣的:(java)