Cobaltstrike RCE 漏洞CVE-2022-39197复现
漏洞简述
该漏洞存在于Cobalt Strike的Beacon软件中,可能允许攻击者在Beacon配置中设置格式错误的用户名,触发XSS,从而导致在CS服务端上造成远程代码执行。
截图:
获取NTLMv2-SSP Hash,前提是Cobalt Strike在Windows运行
参考:
https://www.freebuf.com/vuls/345522.html
https://mp.weixin.qq.com/s?__biz=MzI5Nzc3NDEyNA==&mid=2247483757&idx=1&sn=2397d14549520bac3bd7bec10d433db3&chksm=ecaebc2edbd9353803e2a3f0f5f906121db63e30e76c58654169656e9e40d5c8b5b0e8b80813&token=1380424937&lang=zh_CN#rd
https://forum.butian.net/share/708
https://github.com/Sentinel-One/CobaltStrikeParser
https://github.com/LiAoRJ/CS_fakesubmit