You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request.
Environment
Jupiter version: v1.3.1
JVM version: JDK 1.8(Tested on JDK 1.8.0_65)
Preparation for Vulnerability Verification
There is an additional method named "sayObject" in the service
The application has dependencies on commons-collections and commons-beanutils.
Remote class loading is allowed (either because an old JDK version is being used(eg. 8u65 in this paper), or by using the JVM argument -Dcom.sun.jndi.ldap.object.trustURLCodebase=true)
In MessageTask.run(), as we have set the Serializer to be Kryo:
Subsequently, KryoSerializer receives the object from client and places it into deserialization without conducting any security checks:
The process then follows the CommonsBeanutils gadget:
Remediation Recommendations
1. Upgrade Kryo to Version 5.0 or Higher:
Upgrade the Kryo library to version 5.0 or a later release to benefit from the latest security enhancements and bug fixes.
2. Strict Outbound Internet Access Control
Due to the prevalence of known attack vectors leveraging JDNI injection to achieve Remote Code Execution (RCE), which requires the remote loading of malicious classes, it is recommended, where feasible without impacting business operations, to implement strict outbound internet access controls on server configurations.
3. Restriction of Access to Server
It is advisable to restrict external access to the server either by utilizing whitelist IP configurations or by closing public-facing ports. This measure aims to reduce the attack surface and potential risks associated with external access to the server.
4. Implementation of Whitelists/Blacklists for Serialization/Deserialization Classes
Establishing whitelists or blacklists for serialization/deserialization classes within the serialization protocol is recommended. This helps to restrict the deserialization of malicious classes. However, it is important to note that using a blacklist may introduce the risk of potential bypasses.
The text was updated successfully, but these errors were encountered:
Describe the Vulnerability
A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request.
Environment
Preparation for Vulnerability Verification
There is an additional method named "sayObject" in the service
The application has dependencies on commons-collections and commons-beanutils.
Remote class loading is allowed (either because an old JDK version is being used(eg. 8u65 in this paper), or by using the JVM argument -Dcom.sun.jndi.ldap.object.trustURLCodebase=true)
Exploit and Analysis
POC
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "calc"
Analysis
Trigger
Remediation Recommendations
1. Upgrade Kryo to Version 5.0 or Higher:
Upgrade the Kryo library to version 5.0 or a later release to benefit from the latest security enhancements and bug fixes.
2. Strict Outbound Internet Access Control
Due to the prevalence of known attack vectors leveraging JDNI injection to achieve Remote Code Execution (RCE), which requires the remote loading of malicious classes, it is recommended, where feasible without impacting business operations, to implement strict outbound internet access controls on server configurations.
3. Restriction of Access to Server
It is advisable to restrict external access to the server either by utilizing whitelist IP configurations or by closing public-facing ports. This measure aims to reduce the attack surface and potential risks associated with external access to the server.
4. Implementation of Whitelists/Blacklists for Serialization/Deserialization Classes
Establishing whitelists or blacklists for serialization/deserialization classes within the serialization protocol is recommended. This helps to restrict the deserialization of malicious classes. However, it is important to note that using a blacklist may introduce the risk of potential bypasses.
The text was updated successfully, but these errors were encountered: