SecurityAdvisory @ Mediaservice.net Srl(#05,23/11/2016)DataSecurityDivisionTitle:RedHatJBossEAP deserialization of untrusted data
Application:JBossEAP5.2.X and prior versions
Description:The application server deserializes untrusted data via the
JMXInvokerServlet. This can lead toaDoS via resource
exhaustion and potentially remote code execution.
Author:FedericoDotta<federico.dotta@mediaservice.net>MaurizioAgazzini<inode@mediaservice.net>VendorStatus:Will not fix
CVECandidate:TheCommonVulnerabilities and Exposures project has assigned
the name CVE-2016-7065tothisissue.
References: http://lab.mediaservice.net/advisory/2016-05-jboss.txt
http://lab.mediaservice.net/code/jboss_payload.zip
https://bugzilla.redhat.com/show_bug.cgi?id=13825341.Abstract.
JBossEAP's JMXInvokerServlet is exposed by default on port 8080/TCP. The
communication employs serialized Java objects, encapsulated in HTTP
requests and responses.
The server deserializes these objects without checking the object type. This
behavior can be exploited tocause a denial of service and potentially
execute arbitrary code.
The objects that can cause the DoS are based on known disclosed payloads
taken from:- https://gist.github.com/coekie/a27cc406fc9f3dc7a70d
Currently there is no known chain that allows code execution on JBossEAP,
however new chains are discovered every day.2.ExampleAttackSession.
Submit an authenticated POST request totheJMXInvokerServletURL(for
example: http://localhost:8080/invoker/JMXInvokerServlet)withone of the
following objects in the body of the request:*01_BigString_limited.ser: it's a string object; the server will
reply in a normal way (object size similar tothe next one).*02_SerialDOS_limited.ser: the application server will require
about 2 minutes toexecute the request with100%CPU usage.*03_BigString.ser: it's a string object; the server will
reply in a normal way (object size similar tothe next one).*04_SerialDOS.ser: the application server will require an
unknown amount of time toexecute the request with100%CPU usage.3.AffectedPlatforms.
This vulnerability affects versions 4 and 5 of JBossEAP.4.Fix.
RedHat will not fix the issue because JBossEAP4 is out of maintenance
support and JBossEAP5 is close tothe end of its maintenance period.5.ProofOfConcept.
See jboss_payload.zip (40842.zip) and ExampleAttackSession above.
http://lab.mediaservice.net/code/jboss_payload.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40842.zip
6.Timeline06/10/2016-First communication sent toRedHatSecurityResponseTeam07/10/2016-RedHatSecurityResponseTeam response,Bug138253423/11/2016-SecurityAdvisory released
Copyright(c)2016 @ Mediaservice.net Srl. All rights reserved.
Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40842.zip