0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

More than 5 years have passed since last update.

[漏洞通告]CVE-2020-1947/Apache ShardingSphere UI YAML解析远程代码执行漏洞

Posted at

漏洞描述

近日,亚信安全网络攻防实验室跟踪到Apache ShardingSphere存在YAML解析远程代码执行漏洞,该漏洞由奇安信云影实验室安全研究员maoge提交给Apache官方.Apache ShardingSphere UIApache ShardingSphere的图形界面版产品.攻击者利用此漏洞可以实现代码执行,直接接管服务器.

漏洞编号

CVE-2020-1947

漏洞威胁等级

高危

影响范围

Apache ShardingSphere&&UI <= 4.0.1

漏洞验证

选用Apache ShardingSphere UI 4.0复现漏洞

Apache ShardingSphere UI默认的后台密码均为admin.
image.png

登陆以后,在相应漏洞触发点输入payload即可完成攻击.该payload主要借助于SnakeYAML方法和YAML语法构造.

image.png

修复建议

升级到最新版本即可
https://github.com/apache/incubator-shardingsphere/releases

时间轴

[0] 2020/03/10 奇安信CERT发布漏洞通告
[1] 2020/03/10 亚信安全网络攻防实验室分析&复现该漏洞并发布漏洞通告

鸣谢

感谢Qianxin-Ateam r00t4dm小伙伴一起研究该漏洞

Reference

0
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?