CVE-2022-22733
时间: 2023-10-07 18:10:05 浏览: 208
CVE-2022-22733是一个Apache ShardingSphere ElasticJob-UI的敏感信息泄漏漏洞。由于返回的token中包含了管理员密码,攻击者可以利用该漏洞在授权的情况下构造恶意数据执行权限绕过攻击,最终获取服务器的最高权限。攻击者可以通过访客账户登录并使用burp抓取登录返回包中的"accessToken"进行base64解码获取root账号的密码。然后,攻击者可以构造恶意SQL代码,并保存为一个SQL文件。在添加事件追踪数据源时,攻击者可以使用数据源连接地址来执行该恶意SQL文件,从而达到获取服务器最高权限的目的。<span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* [CVE-2022-33891POCApache Spark 命令注入(CVE-2022-33891)POC](https://download.csdn.net/download/qq_51577576/86396832)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 33.333333333333336%"]
- *2* [春秋云镜 CVE-2022-22733](https://blog.csdn.net/qq_22002773/article/details/131790429)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 33.333333333333336%"]
- *3* [[春秋云镜]CVE-2022-22733](https://blog.csdn.net/niubi707/article/details/128176246)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 33.333333333333336%"]
[ .reference_list ]
阅读全文