|
| 1 | +package org.joychou.security; |
| 2 | + |
| 3 | +import org.slf4j.Logger; |
| 4 | +import org.slf4j.LoggerFactory; |
| 5 | + |
| 6 | +import java.io.*; |
| 7 | + |
| 8 | +/** |
| 9 | + * RASP:Hook java/io/ObjectInputStream类的resolveClass方法 |
| 10 | + * RASP: https://github.com/baidu/openrasp/blob/master/agent/java/engine/src/main/java/com/baidu/openrasp/hook/DeserializationHook.java |
| 11 | + * |
| 12 | + * Run main method to test. |
| 13 | + */ |
| 14 | +public class AntObjectInputStream extends ObjectInputStream { |
| 15 | + |
| 16 | + private final Logger logger= LoggerFactory.getLogger(AntObjectInputStream.class); |
| 17 | + |
| 18 | + public AntObjectInputStream(InputStream inputStream) throws IOException { |
| 19 | + super(inputStream); |
| 20 | + } |
| 21 | + |
| 22 | + /** |
| 23 | + * 只允许反序列化SerialObject class |
| 24 | + * |
| 25 | + * 在应用上使用黑白名单校验方案比较局限,因为只有使用自己定义的AntObjectInputStream类,进行反序列化才能进行校验。 |
| 26 | + * 类似fastjson通用类的反序列化就不能校验。 |
| 27 | + * 但是RASP是通过HOOK java/io/ObjectInputStream类的resolveClass方法,全局的检测白名单。 |
| 28 | + * |
| 29 | + */ |
| 30 | + @Override |
| 31 | + protected Class<?> resolveClass(final ObjectStreamClass desc) |
| 32 | + throws IOException, ClassNotFoundException |
| 33 | + { |
| 34 | + String className = desc.getName(); |
| 35 | + |
| 36 | + // Deserialize class name: org.joychou.security.AntObjectInputStream$MyObject |
| 37 | + logger.info("Deserialize class name: " + className); |
| 38 | + |
| 39 | + String[] denyClasses = {"java.net.InetAddress", "org.apache.commons.collections.Transformer"}; |
| 40 | + |
| 41 | + for (String denyClass : denyClasses) { |
| 42 | + if (className.startsWith(denyClass)) { |
| 43 | + throw new InvalidClassException("Unauthorized deserialization attempt", className); |
| 44 | + } |
| 45 | + } |
| 46 | + |
| 47 | + return super.resolveClass(desc); |
| 48 | + } |
| 49 | + |
| 50 | + public static void main(String args[]) throws Exception{ |
| 51 | + // 定义myObj对象 |
| 52 | + MyObject myObj = new MyObject(); |
| 53 | + myObj.name = "world"; |
| 54 | + |
| 55 | + // 创建一个包含对象进行反序列化信息的/tmp/object数据文件 |
| 56 | + FileOutputStream fos = new FileOutputStream("/tmp/object"); |
| 57 | + ObjectOutputStream os = new ObjectOutputStream(fos); |
| 58 | + |
| 59 | + // writeObject()方法将myObj对象写入/tmp/object文件 |
| 60 | + os.writeObject(myObj); |
| 61 | + os.close(); |
| 62 | + |
| 63 | + // 从文件中反序列化obj对象 |
| 64 | + FileInputStream fis = new FileInputStream("/tmp/object"); |
| 65 | + AntObjectInputStream ois = new AntObjectInputStream(fis); // AntObjectInputStream class |
| 66 | + |
| 67 | + //恢复对象即反序列化 |
| 68 | + MyObject objectFromDisk = (MyObject)ois.readObject(); |
| 69 | + System.out.println(objectFromDisk.name); |
| 70 | + ois.close(); |
| 71 | + } |
| 72 | + |
| 73 | + static class MyObject implements Serializable { |
| 74 | + public String name; |
| 75 | + } |
| 76 | +} |
| 77 | + |
| 78 | + |
0 commit comments