You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Create the config.json file and copy the payload in
Log in to the Backstage management system, select template management
default password:admin/admin123
Click config.json
Click Replace file
Replace with the config.json file containing the payload just created
Visit /ueditor, execute the command to pop up the calculator
http://localhost:8080/jfinal_cms/ueditor
Vulnerability analysis
com.jflyfox.component.controller.Ueditor
The ActionEnter class is instantiated in the index method of the /ueditor route
com.baidu.ueditor.ActionEnter#ActionEnter
The ConfigManager class is instantiated in the constructor of the ActionEnter class
com.baidu.ueditor.ConfigManager#ConfigManager
The construction method of ConfigManager calls initEnv()
com.baidu.ueditor.ConfigManager#initEnv
Call JSONObject.parseObject to parse the file content, and the file content here is controllable, just replace the file content with the payload.
com.baidu.ueditor.ConfigManager
The file comes from WEB-INF/classes/config.json. With any file upload vulnerability in the background, this file can be replaced with a file containing the payload to trigger fastjson deserialization
The text was updated successfully, but these errors were encountered:
Vulnerability summary
A command execution vulnerability exists in jfinal_cms 5.0.1
JDK version requirements:
jfinal_cms version:5.0.1
fastjson version:1.2.28
![image](https://user-images.githubusercontent.com/74842799/136699768-063a393d-eb07-406c-bf0d-56e85bd1850c.png)
vulnerability recurrence
JDK version used in the test: JDK8u101
Run the tool on kali, start rmi and ldap services
https://github.com/feihong-cs/JNDIExploit
replace rmi or ldap address in payload:
Create the config.json file and copy the payload in
Log in to the Backstage management system, select template management
default password:admin/admin123
Click config.json
![image](https://user-images.githubusercontent.com/74842799/136699883-6e364dbb-ac6d-4d2f-b752-cd1fe301d4d1.png)
Click Replace file
Replace with the config.json file containing the payload just created
![image](https://user-images.githubusercontent.com/74842799/136699915-fab0bce3-1dba-4cfa-9f82-4e80ff227980.png)
Visit /ueditor, execute the command to pop up the calculator
Vulnerability analysis
com.jflyfox.component.controller.Ueditor
The ActionEnter class is instantiated in the index method of the /ueditor route
![image](https://user-images.githubusercontent.com/74842799/136699980-4c35d39e-e66c-4b10-a791-1ed1c4ab7175.png)
com.baidu.ueditor.ActionEnter#ActionEnter
The ConfigManager class is instantiated in the constructor of the ActionEnter class
![image](https://user-images.githubusercontent.com/74842799/136699988-bef4c535-1ffe-4074-b577-68647d9c25a0.png)
com.baidu.ueditor.ConfigManager#ConfigManager
The construction method of ConfigManager calls
![image](https://user-images.githubusercontent.com/74842799/136700004-49492c58-c9ce-4d0f-98e0-ee8f98c8d190.png)
initEnv()
com.baidu.ueditor.ConfigManager#initEnv
Call JSONObject.parseObject to parse the file content, and the file content here is controllable, just replace the file content with the payload.
![image](https://user-images.githubusercontent.com/74842799/136700024-a3bd49cc-d4d3-4d97-94d6-e72d2e7e0ae8.png)
com.baidu.ueditor.ConfigManager
The file comes from
![image](https://user-images.githubusercontent.com/74842799/136700032-319f4dfa-721e-4925-a787-c979d11dfbe3.png)
![image](https://user-images.githubusercontent.com/74842799/136700034-d7b31c51-6757-43a3-a6aa-d0d2e7663fc1.png)
WEB-INF/classes/config.json
. With any file upload vulnerability in the background, this file can be replaced with a file containing the payload to trigger fastjson deserializationThe text was updated successfully, but these errors were encountered: