purple-WL / Cobaltstrike-RCE-CVE-2022-39197

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Cobaltstrike RCE 漏洞CVE-2022-39197复现

漏洞简述

该漏洞存在于Cobalt Strike的Beacon软件中,可能允许攻击者在Beacon配置中设置格式错误的用户名,触发XSS,从而导致在CS服务端上造成远程代码执行。

截图: image

获取NTLMv2-SSP Hash,前提是Cobalt Strike在Windows运行

image

参考:

https://www.freebuf.com/vuls/345522.html

https://mp.weixin.qq.com/s?__biz=MzI5Nzc3NDEyNA==&mid=2247483757&idx=1&sn=2397d14549520bac3bd7bec10d433db3&chksm=ecaebc2edbd9353803e2a3f0f5f906121db63e30e76c58654169656e9e40d5c8b5b0e8b80813&token=1380424937&lang=zh_CN#rd

https://forum.butian.net/share/708

https://github.com/Sentinel-One/CobaltStrikeParser

https://github.com/LiAoRJ/CS_fakesubmit

About