POC详情: e9129cbc36053c99ab298a09b5ca2c9aa8bd7b0d

来源
关联漏洞
标题: JetBrains TeamCity 安全漏洞 (CVE-2023-42793)
描述:JetBrains TeamCity是捷克JetBrains公司的一套分布式构建管理和持续集成工具。该工具提供持续单元测试、代码质量分析和构建问题分析报告等功能。 JetBrains TeamCity 2023.05.4之前版本存在安全漏洞,该漏洞源于攻击者可以绕过身份验证,导致在 TeamCity 服务器上执行RCE 。
描述
CVE-2023-42793
介绍
## TeamCity CVE-2023-42793 Exploit

This Python script exploits a security vulnerability (CVE-2023-42793) in JetBrains TeamCity, allowing an attacker to  create a new user with administrative privileges.

### Usage
The script takes either a single TeamCity instance URL or a list of URLs as input. The provided URL(s) should point to the TeamCity server(s) that are vulnerable to CVE-2023-42793.

#### Single URL:
```bash
python exploit.py -u http://teamcity.example.com
```

#### List of URLs:
```bash
python exploit.py -l url_list.txt
```
![image](https://github.com/H454NSec/CVE-2023-42793/assets/127287794/34239694-f418-46da-8168-9f01234d3be3)

### Dork:
- Google: `intitle:"log in to teamcity"`
- Shodan: `http.component:"TeamCity"`
- Shodan: `http.title:"Log in to TeamCity -- TeamCity"`
- Shodan: `http.title:TeamCity`

### How it Works
1. **Token Deletion**: The script initiates a DELETE request to remove the user token associated with the default user (id:1).
2. **Token Creation**: Upon successful token deletion, a new user token is created for the same default user.
3. **User Creation**: Using the newly generated token, the script then creates a new user with administrative privileges.
4. **Output**: Successful exploits are reported, and the compromised URLs are appended to a file named `vulnerable.txt`.

### Prerequisites
- Python 3.x


## Buy Me a Coffee

Hey Hackers, if this repository has helped you secure the internet, how about buying me a coffee to keep the coding fuel flowing?

[![☕ Buy Me a Coffee!](https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png)](https://buymeacoffee.com/H454NSec)

## 🪙 Cryptocurrency Donations

Feel like going beyond coffee? You can also support this project with cryptocurrency donations:

- **Monero (XMR):** `88m2c6n4rRtE7esrXmSba5K34QX5Rv6BgLCpEH7QtDw9UnW6h82itbGbomvgZFYa6AcwRJ5qzMpf1LMCKGyFbzhTAbJZ7Ew`
- **Bitcoin (BTC):** `bc1qpww8uxflvrjxkm4u3390kf4xtyl7udupw3rrxc`
- **Ethereum (ETH):** `0x1312c0cf549b504a8c5a73f73712f839eb193edc`
### Your support keeps the project alive and motivates me to create more awesome stuff. Cheers! 🚀
## License

This repository is licensed under the [GNU General Public License v3.0](LICENSE).

## Disclaimer
This repository and its contents, including scripts, PoCs, and exploits, are provided for educational purposes only. Usage of these materials should be conducted responsibly and solely on systems for which you have explicit permission to test. Users are required to comply with local laws and adhere to ethical guidelines when utilizing any tools or code from this repository. The author disclaims responsibility for any misuse or damage resulting from the use of the contents within this repository.

# Stars
[![Stars](https://starchart.cc/H454NSec/CVE-2023-42793.svg)](https://starchart.cc/H454NSec/CVE-2023-42793)
文件快照

[4.0K] /data/pocs/e9129cbc36053c99ab298a09b5ca2c9aa8bd7b0d ├── [3.7K] CVE-2023-42793.py └── [2.8K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。