经过了几天的测试发现了漏洞点,但是不会利用。网上也没有利用细节。。。。
POST /war/createView?name=aa0a&Jenkins-Crumb=852fc9b24d0eac84bda9555a66639f171a8cfd32a73558ee7cf64160ffb337b9&json=%7B%22name%22%3A+%22aaaa%22%2C+%22mode%22%3A+%22hudson.plugins.nested_view.NestedView%22%2C+%22Jenkins-Crumb%22%3A+%22852fc9b24d0eac84bda9555a66639f171a8cfd32a73558ee7cf64160ffb337b9%22%7D&Submit=%E7%A1%AE%E5%AE%9A HTTP/1.1
Host: 127.0.0.1:8888
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Referer: http://127.0.0.1:8888/war/newView
Content-Type: application/xml
Content-Length: 4110
Origin: http://127.0.0.1:8888
Connection: close
Cookie: JSESSIONID=000C4677A065C4C91F42D324547826EA; screenResolution=1408x792
Upgrade-Insecure-Requests: 1
poc
但是报错。。。
xxe漏洞。
大体上可以参考: