Closed ChrisJoinEngine closed 3 years ago
Thanks for sharing this with us. Can you please give access to @ghidra1?
Hi @ryanmkurtz,
I just wanted to follow up on this and see if you had any issues replicating or if any additional details were needed.
We usually follow Google's disclosure guidelines, and would like to make the proof of concept public in 90 days.
Apologies for the delay...we'll have some feedback for you tomorrow. Thanks for your patience.
Can you please invite me again?
Sure thing, I sent you a new invite. Please don't hesitate to ask if the PoC gives you any issues at all. Thanks
@ChrisJoinEngine While we were unable to demonstrate SSRF with your test code we have added a serialization filter to the Ghidra Server which has been merged for both patch and master: edbad325084c237b8ffa82e399e884ed42e6358c
See related discussion here: https://github.com/ChrisJoinEngine/CVE-2021-40821/issues/1
Please let us know your disposition of CVE-2021-40821
Yea, I think it is fair to close this one. Thanks for your time, and looking into it
Thanks for bringing our attention to the potential issue.
Describe the bug https://github.com/adrianbn and I are security researches. While doing some work on RMI, we discovered Ghidra Server is vulnerable to a deserialization attack via RMI that leads to SSRF. This is a partially blind SSRF, but requires no authentication.
To Reproduce We have a proof of concept we can share. In the interest of responsible disclosure, we didn't want to make our github page public just yet, but please let us know if you'd like access, it's currently at https://github.com/ChrisJoinEngine/CVE-2021-40821 (private github as of posting this, we'll add you as collaborators).
Expected behavior The easiest way is to use our proof of concept, and point the script to a Burp Collaborator instance. When you run the script against a Ghidra Server instance, you will see an HTTP request in your collaborator from the Ghidra Server. You can also request a file that is present, and one that is not on the Server's filesystem (e.g. /etc/passwd and /etc/notreal); while you won't be able to view the files, you will see corresponding error messages.
Environment (please complete the following information):
Additional context Let us know who we give access to the proof of concept, or if there is a better way to report security issues. The PoC has additional details and walkthrough of the exploit.