[xxl-job] RCE unauthorized remote command execution analysis + POC test

[xxl-job] remote command execution vulnerability
[reference address] https://github.com/mrknow001/xxl-job-rce
[actual test] fingerprint collection
http://xxxx:9999/. (default is 9999)
, fingerprint The information is respose returns as follows, you can try
{"code": 500, "msg": "invalid request, HttpMethod not support."} POC test
Test success record
Fingerprint collection: fofa, shodan
ps: only used for problem verification testing, illegal activities are prohibited

Guess you like

Origin blog.csdn.net/u013908944/article/details/109521432