Matasano published one of two canonical papers on JBoss exploitation. While working on a fresh new tool, I came across the JMXInvokerServlet technique, which uses serialized Java requests to deploy to remote MBeans. This uses a specific object hash to route the JMX request to the correct MBean; in our case, the gold is jboss.jmx:name=Invoker.
In this paper, Matasano provides the hash for JBoss 4.0.3SP1, but does not list any others, nor show how it derived this. After perusing the code, however, I found it to be quite simple, and have developed a simple method for fetching hashes of not only the Invoker MBean, but any listed in the JBoss registry.
To extract these values, we simply deploy a WAR file that dumps the entirety of the Registry, which is used for hash lookups when routing requests. This can can be seen below:
1 2 3 4 5 6 7 8 9 10 11 12
When deployed and executed on my local 4.0.5.GA JBoss server, we get:
With this, we’ve fetched the hash for the Invoker MBean as well as every other invokable MBean in the registry. This value appears to be common across all 3.x and 4.x JBoss instances. However, when run against JBoss 5.x/6.x instances, the following is returned:
This change is due to the way look-ups are performed in 5.x; instead of the key being an Integer (hash), the key is now an Object, as shown below:
To further enumerate this, we can iterate over the class methods and pull all of their hashes and hash codes:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
Which gives us:
Judging by this information, it doesn’t appear that we can remotely invoke the same way we did with 3.x/4.x. This is the fundamental issue with several of the available open source JBoss tools (Metasploit); none of them take into account the changes between different versions of JBoss.
Although I have yet to discover a way to map requests to the invoker (I’m not entirely sure its possible) in these later versions, I have a suspicion that we may be able to map these requests by serializing objects out. More on this, and my exploitation tool, soon.