8009 - Ajp
💡 学习提示: 本文档介绍 8009 - Apache JServ (AJP) 的渗透测试方法,适合信息安全初学者和从业人员参考。
⚠️ 法律声明: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。
Also interesting:
The ajp13 protocol is packet-oriented. A binary format was presumably chosen over the more readable plain text for reasons of performance. The web server communicates with the servlet container over TCP connections. To cut down on the expensive process of socket creation, the web server will attempt to maintain persistent TCP connections to the servlet container, and to reuse a connection for multiple request/response cycles
默认 port: 8009
CVE-2020-1938 ‘Ghostcat’
This is an LFI vuln which allows to get some files like WEB-INF/web.xml which contains credentials. This is an exploit to abuse the vulnerability and AJP exposed ports might be vulnerable to it.
The patched versions are at or above 9.0.31, 8.5.51, and 7.0.100.
信息收集
Automatic
Brute force
AJP 代理
Nginx Reverse 代理 + AJP
(Checkout the Dockerized version)
It’s possible to communicate with an open AJP proxy port (8009 TCP) by using the Nginx ajp_module apache module and access the Tomat Manager from this port which could ultimately lead to 远程代码执行 in the vulnerable server.
- Start downloading Nginx from https://nginx.org/en/download.html and then compile it with the ajp module:
- Then, comment the
serverblock and add the following in thehttpblock in/etc/nginx/conf/nginx.conf.
- Finally, start nginx (
sudo nginx) and check it works by accessinghttp://127.0.0.1
Nginx Dockerized-version
Replace TARGET-IP in nginx.conf witg AJP IP then build and run
Apache AJP 代理
It’s also possible to use an Apache AJP proxy to access that port instead of Nginx.