Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24442 PoC — JetBrains YouTrack 代码注入漏洞

Source
Associated Vulnerability
Title:JetBrains YouTrack 代码注入漏洞 (CVE-2022-24442)
Description:JetBrains YouTrack是捷克JetBrains公司的一套基于浏览器的错误跟踪和项目管理软件。该软件具有错误跟踪、创建工作流程和监控项目进度等功能。 JetBrains YouTrack 2021.4.40426之前版本存在代码注入漏洞,攻击者可利用该漏洞执行SSTI(服务器端模板注入)攻击。
Description
CVE-2022-24442: FreeMarker Server-Side Template Injection in JetBrains YouTrack
Readme
# CVE-2022-24442: FreeMarker Server-Side Template Injection in JetBrains YouTrack

By inserting malicious content in the Notification FTL files, an attacker may perform SSTI (Server-Side Template Injection) attacks, which can leverage FreeMarker exposed objects to bypass restrictions and obtain RCE (Remote Code Execution).

<strong>Note:</strong> This issue exists because of an incomplete fix for CVE-2021-25770.

### Vendor Disclosure:

The vendor's disclosure and fix for this vulnerability can be found [here](https://www.jetbrains.com/privacy-security/issues-fixed/).

### Requirements:

This vulnerability requires:
<br/>
- Valid user credentials

### Proof Of Concept:

More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2022-24442/blob/main/YouTrack%20-%20CVE-2022-24442.pdf).

### Additional Resources:

[Awesome article](https://www.synacktiv.com/publications/exploiting-cve-2021-25770-a-server-side-template-injection-in-youtrack) by [Vincent Herbulot of Synacktiv](https://www.synacktiv.com/en/our-team/pentest) that inspired the finding of this vulnerability.

Initial vulnerability [CVE-2021-25770](https://nvd.nist.gov/vuln/detail/CVE-2021-25770) discovered by Vasily Vasilkov.
File Snapshot

[4.0K] /data/pocs/3919e19599aaa90ce4976362ed2216ea77101069 ├── [1.2K] README.md └── [4.0M] YouTrack - CVE-2022-24442.pdf 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.