RuoYi icon indicating copy to clipboard operation
RuoYi copied to clipboard

Wrong code modification leads to Shiro deserialization vulnerability

Open BetterDefender opened this issue 3 years ago • 0 comments

The cause of the vulnerability The project uses shiro1.7.0 version, this version should not have this vulnerability; image image Code layer troubleshooting:

  1. The default key is used (one of the reasons for this vulnerability) image
  2. From the point of view of the exploited gadget, the commonscollection exploit chain is used (the second reason for this vulnerability), and the commons-collections vulnerability should use version 3.2.2 and above image
  3. Check shiro related calling code: image The Shiro deserialization vulnerability is caused by calling the getRememberedSerializedIdentity() function of the CookieRememberMeManager class. The official repair code is as follows, the repair plan is to delete the CookieRememberMeManager class image The CookieRememberMeManager class was added when the open source project was rewritten, which led to the generation of vulnerabilities.

Exploit: You can use the following tools to exploit this vulnerability, Github project: https://github.com/j1anFen/shiro_attack image Execute system commands image

BetterDefender avatar Mar 13 '21 05:03 BetterDefender