Confluence Server和Data Center產品在downloadallattachments資源中存在一個路徑穿越漏洞。有權向頁面和(或)博客添加附件,或建立新空間或我的空間,或者對空間具備「管理員」權限的遠程***者能夠利用此漏洞將文件寫入任意位置,最終致使遠程代碼執行。html
升級Confluence Server或Data Center版本:
6.6.13
6.13.4
6.14.3
6.15.2
執行官方緩解措施:
中止Confluence編輯<install-directory>/conf/server.xml
若是你沒有爲 Confluence 配置 context path,則將如下代碼添加至 <Host> 元素中:<br/><Context path="/pages/downloadallattachments.action" docBase="" > <Valapp className="org.apache.catalina.valapps.RemoteAddrValapp" deny="*" /> </Context>
linux
若是你爲 Confluence 配置了 context path,好比說 /wiki,則須要將如下代碼添加至 <Host> 元素中:<br/><Context path="/wiki/pages/downloadallattachments.action" docBase="" > <Valapp className="org.apache.catalina.valapps.RemoteAddrValapp" deny="*" /> </Context>
shell
wget https://www.atlassian.com/software/confluence/downloads/binary/atlassian-confluence-6.13.0.zip<br/>unzip atlassian-confluence-6.13.0.zip<br/>cd atlassian-confluence-6.13.0/confluence/WEB-INF/classes<br/>
編輯confluence-init.properties
修改confluence.home
啓動:
cd atlassian-confluence-6.13.0/bin
./start-confluence.shapache
第一步上傳文件:json
第二步:打包下載(觸發漏洞)app
第三步:訪問shell
http://192.168.56.248:8090/cmd13.jsp?comment=whoamisocket
使用idea 進行遠程調試
首先須要在catalina.sh 添加以下代碼export JAVA_OPTS='-Xdebug -Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=8002'<br/>
在idea中配置:jsp
此時能夠進行遠程調試了
`public String execute() throws Exception {
List<Attachment> latestAttachments = this.attachmentManager.getLatestVersionsOfAttachments(this.getPage());
Iterator var2 = latestAttachments.iterator();ide
while(var2.hasNext()) { Attachment attachment = (Attachment)var2.next(); File tmpFile = new File(this.getTempDirectoryForZipping(), attachment.getFileName()); InputStream inputStream = this.attachmentManager.getAttachmentData(attachment); Throwable var6 = null; try { OutputStream fileOutputStream = new FileOutputStream(tmpFile); Throwable var8 = null; try { ByteStreams.copy(inputStream, fileOutputStream); } catch (Throwable var31) { var8 = var31; throw var31; } finally { if (fileOutputStream != null) { if (var8 != null) { try { fileOutputStream.close(); } catch (Throwable var30) { var8.addSuppressed(var30); } } else { fileOutputStream.close(); } } } } catch (Throwable var33) { var6 = var33; throw var33; } finally { if (inputStream != null) { if (var6 != null) { try { inputStream.close(); } catch (Throwable var29) { var6.addSuppressed(var29); } } else { inputStream.close(); } } } } File zipFile = new File(this.getConfluenceTempDirectoryPath() + File.separator + this.getZipFilename() + ".zip"); FileUtils.createZipFile(this.getTempDirectoryForZipping(), zipFile); FileUtils.deleteDir(this.getTempDirectoryForZipping()); this.downloadPath = this.prepareDownloadPath(zipFile.getPath()) + "?contentType=application/zip"; this.gateKeeper.addKey(this.prepareDownloadPath(zipFile.getPath()), this.getAuthenticatedUser()); return "success"; }`
漏洞產生在:
ByteStreams.copy(inputStream, fileOutputStream);this
跟蹤fileOutputStream
attachment有title參數:
attachment.getFileName() 獲取的值就是title
title 值來源
<br/>InputStream inStream = this.getStreamForEncoding(this.httpServletRequest);<br/>this.fileUploadManager.storeResource(new InputStreamAttachmentResource(inStream, this.filename, this.mimeType, this.size, (String)null, this.minorEdit), (ContentEntityObject)content);<br/>if (this.withEditorPlaceholder) {<br/>this.jsonResult.put("htmlForEditor", this.dragAndDropService.getAttachmentEditorHtml(this.filename, (ContentEntityObject)content, this.isVFMSupported, this.contentType));<br/>}<br/>
對filename 沒有進行任何過濾
https://confluence.atlassian.com/doc/confluence-security-advisory-2019-04-17-968660855.html
https://twitter.com/search?q=CVE-2019-3398&src=typd
https://confluence.atlassian.com/conf59/installing-confluence-on-linux-792499834.html