Skip to content

The study of vulnerability CVE-2017-3066. Java deserialization

Notifications You must be signed in to change notification settings

cucadili/CVE-2017-3066

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2017-3066

Description

Adobe ColdFusion uses message format the Action (AMF). The AMF Protocol is a custom binary serialization Protocol. It has two formats: AMF0 and AMF3. Action message consists of headers and bodies. There are several implementations of AMF in different languages. For Java we have Adobe BlazeDS (now Apache BlazeDS) which is also used in Adobe ColdFusion. Adobe Coldfusion is affected to a Java Deserialisation Flaw in its Apache BlazeDS Library when it handles untrusted Java Objects which further gives Attacker the permission to attack remotely as a Remote Code Execution Vulnerability.

Vulnerable Version

alt text

Update Version

alt text

Comparison of vulnerable and updated version

WinMerge Update files: alt text

The flex-messaging-core.jar library contains the class flex.messaging.validators.ClassDeserializationValidator that performs validation. Therefore, it was separately decompiled using the Java Decompiler and once again launched for comparison in WinMerge.

alt text

Install

Install and Exploiting: https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2017-3066

Suricata

In the file "test.rules " presents a rule for the Suricata utility. The rule allows network traffic to detect exploitable vulnerabilities. The rule is connected in the /etc/suricata/suricata file.yaml:

    default-rule-path: /etc/suricata 
    rule-files: 
     - test.rules

RUN:

suricata -c /etc/suricata/suricata.yaml –I ens33

Log /var/log/suricata/fast.log

Signature 79 73 6F 73 65 72 69 61 = ysoserial

About

The study of vulnerability CVE-2017-3066. Java deserialization

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published