Sparkjava Framework 任意文件读取漏洞

基本字段

漏洞编号:
SSV-92517
披露/发现时间:
未知
提交时间:
2016-11-04
漏洞等级:
漏洞类别:
任意文件读取
影响组件:
Spark
漏洞作者:
未知
提交者:
Knownsec
CVE-ID:
补充
CNNVD-ID:
补充
CNVD-ID:
补充
ZoomEye Dork:
补充

来源

漏洞详情

贡献者 Knownsec 共获得  0KB

Classpath Vuln

Exploit the classpath based vulnerability with something like:

curl "http://<host>/..\..\spark\Spark.class"

The number of ..\ you need in the path depends on where in the classpath the static file location is configured to be. If you don't have the right amount then you don't get anything, but this is trivially brute forced. The classpath often has juicy things like configuration files and keystores, or you could look for non-framework class files and decompile them.

Filesystem Vuln

Try something like:

curl
"http://<host>/..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\etc\passwd"

I'm sure you can figure out what to do from here.

This is tested on Spark 2.5 and git master, it should work on earlier versions.

If you need a workaround, don't use Spark to serve static files and move them to another web server.

共 0  兑换了

PoC

暂无 PoC

参考链接

解决方案

临时解决方案

暂无临时解决方案

官方解决方案

暂无官方解决方案

防护方案

暂无防护方案

人气 5411
评论前需绑定手机 现在绑定

暂无评论

※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负