first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled

This commit is contained in:
2025-09-06 16:08:15 +08:00
commit 63285f61aa
2624 changed files with 88491 additions and 0 deletions

View File

@@ -0,0 +1,30 @@
# Hadoop YARN ResourceManager 未授权访问漏洞
Hadoop YARNYet Another Resource Negotiator是Apache Hadoop的集群资源管理系统。YARN ResourceManager中存在一个未授权访问漏洞由于缺少访问控制未经授权的用户可以在集群上提交并执行任意应用程序。
参考链接:
- <http://archive.hack.lu/2016/Wavestone%20-%20Hack.lu%202016%20-%20Hadoop%20safari%20-%20Hunting%20for%20vulnerabilities%20-%20v1.0.pdf>
- <https://hadoop.apache.org/docs/r2.7.3/hadoop-yarn/hadoop-yarn-site/ResourceManagerRest.html>
## 环境搭建
执行如下命令启动环境:
```
docker compose up -d
```
环境启动后,访问`http://your-ip:8088`即可看到Hadoop YARN ResourceManager的Web管理界面。
## 漏洞复现
漏洞利用方法与原始演示文稿中的方法略有不同。即使没有Hadoop客户端也可以直接通过REST APIhttps://hadoop.apache.org/docs/r2.7.3/hadoop-yarn/hadoop-yarn-site/ResourceManagerRest.html提交任务执行。
漏洞利用过程如下:
1. 在本地机器上设置监听器等待反弹shell连接
2. 调用New Application API创建应用程序
3. 调用Submit Application API提交恶意应用程序
具体实现请参考[漏洞利用脚本](exploit.py)。