漏洞复现
Vulhub-漏洞环境搭建
1panel
Bash
Tomcat
Apache Shiro框架漏洞
Apache Struts2
Apache漏洞
ThinkPHP框架漏洞
MySQL写入shell
-
+
首页
Vulhub-漏洞环境搭建
Vulhub是一个面向安全研究人员和教育工作者的开源预构建漏洞Docker环境集合。 官网地址:https://vulhub.org/zh ## Linux安装docker 官方安装教程:https://docs.docker.com/engine/install/ubuntu/ 1、如果有旧版本, 先进行卸载。 ```bash apt-get remove docker docker-engine docker.io containerd runc ``` 2、安装依赖包。 ```bash apt-get update apt-get install ca-certificates curl gnupg lsb-release ``` 3、创建密钥存储目录。 ```bash mkdir -p /etc/apt/keyrings ``` 4、由于国内可能无法访问到官方源,可以使用国内源(阿里云)。 ```bash # 移除可能损坏的密钥文件 sudo rm -f /etc/apt/keyrings/docker.gpg # 使用阿里云的Docker GPG密钥 curl -fsSL https://mirrors.aliyun.com/docker-ce/linux/ubuntu/gpg | sudo gpg --dearmor -o /etc/apt/keyrings/docker.gpg # 设置阿里云Docker仓库 echo "deb [arch=$(dpkg --print-architecture) signed-by=/etc/apt/keyrings/docker.gpg] https://mirrors.aliyun.com/docker-ce/linux/ubuntu $(lsb_release -cs) stable" | sudo tee /etc/apt/sources.list.d/docker.list > /dev/null # 继续安装Docker apt-get update # 安装最新版Docker组件 apt-get install docker-ce docker-ce-cli containerd.io docker-compose-plugin ``` 5、验证docker安装。 ```bash # 启动Docker服务 sudo systemctl start docker # 设置开机自启 sudo systemctl enable docker # 运行测试容器(成功会输出"Hello from Docker!") sudo docker run hello-world ``` 6、Docker Compose 已通过`docker-compose-plugin`集成到 Docker CLI 中,验证版本: ```bash docker compose version ``` ## Windows安装docker 官网地址:https://www.docker.com/products/docker-desktop/ docker的基本使用方法:https://maolin101.com/doc/187/ ## Vulhub安装 1、克隆仓库地址。 ```bash git clone --depth 1 https://github.com/vulhub/vulhub.git ``` 2、选择漏洞环境,浏览仓库并选择您想要探索的漏洞,每个目录代表一个不同的漏洞应用程序。 ```bash test@test-VMware-Virtual-Platform:~$ cd vulhub/ test@test-VMware-Virtual-Platform:~/vulhub$ ls 1panel bash discuz fastjson gogs java kkfileview minio openfire postgres scrapy thinkphp yapi activemq cacti django ffmpeg gradio jboss langflow mojarra opensmtpd python shiro tikiwiki zabbix adminer celery dns flask grafana jenkins laravel mongo-express openssh rails showdoc tomcat airflow cgi docker flink h2database jetty librsvg mysql openssl README.md skywalking unomi aj-report cmsms drupal geoserver hadoop jimureport libssh nacos opentsdb README.zh-cn.md solr uwsgi apache-cxf coldfusion dubbo ghostscript hertzbeat jira LICENSE neo4j pdfjs redis spark v2board apache-druid confluence ecshop git httpd jmeter liferay-portal next.js pgadmin rocketchat spring vite apereo-cas contributors.md elasticsearch gitea hugegraph joomla log4j nexus php rocketmq struts2 weblogic apisix contributors.zh-cn.md electron gitlab imagemagick jumpserver magento nginx phpmailer rsync superset webmin appweb couchdb elfinder gitlist influxdb jupyter metabase node phpmyadmin ruby supervisor wordpress aria2 craftcms environments.toml glassfish ingress-nginx kafka metersphere ntopng phpunit saltstack teamcity xstream base cups-browsed erlang goahead jackson kibana mini_httpd ofbiz polkit samba tests xxl-job ``` 3、确定好想要探索的漏洞后,启动环境。 ```bash test@test-VMware-Virtual-Platform:~/vulhub$ cd tomcat/ test@test-VMware-Virtual-Platform:~/vulhub/tomcat$ ls CVE-2017-12615 CVE-2020-1938 CVE-2025-24813 tomcat8 test@test-VMware-Virtual-Platform:~/vulhub/tomcat$ cd tomcat8/ test@test-VMware-Virtual-Platform:~/vulhub/tomcat/tomcat8$ ls 1.png context.xml docker-compose.yml README.md README.zh-cn.md tomcat-users.xml test@test-VMware-Virtual-Platform:~/vulhub/tomcat/tomcat8$ ``` ```bash docker compose up -d ``` ```bash S:\vulhub\vulhub\tomcat\tomcat8>docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES ff919562a575 vulhub/tomcat:8.0 "catalina.sh run" 11 minutes ago Up 11 minutes 0.0.0.0:8080->8080/tcp, [::]:8080->8080/tcp tomcat8-tomcat-1 ``` 4、访问应用程序,环境运行后,通过浏览器访问漏洞应用程序。 ```url http://127.0.0.1:8080 ```  5、停止环境。 ```bash docker compose down -v ``` 6、重建环境。 ```bash docker compose build --no-cache ``` 7、查看日志。 ```bash docker compose logs -f ``` 8、访问容器的shell。 ```bash docker compose exec [service_name] bash ``` 9、删除镜像。 ```bash docker rmi 镜像ID或者镜像名:标签 ``` ```bash S:\vulhub\vulhub\tomcat\tomcat8>docker images REPOSITORY TAG IMAGE ID CREATED SIZE vulhub/tomcat 8.0 458575a05d97 8 years ago 357MB S:\vulhub\vulhub\tomcat\tomcat8>docker rmi 458575a05d97 Untagged: vulhub/tomcat:8.0 Untagged: vulhub/tomcat@sha256:a59ad8f82f6be9950a2342bbd0def8ecd890e7cced0b53a4a6dfa8a3e615ab6b Deleted: sha256:458575a05d97b490182ff6417f862c90710ea9a94ab0126d38d64ca49de688c5 Deleted: sha256:6a2d00684b22f7cb3fc7d7fbec555969bfc25d25c6d960456c3783c22e0dd5a2 Deleted: sha256:9b371d03bd98831deda65ce53d071cc1f705e4ad69c15d2bbb82d42ed9385414 Deleted: sha256:3b544553cf591e534274432125d243f3bb2b6e8e1176c41e14295016e98473d6 Deleted: sha256:86c96a73f7c53fc888fc8a6bbd3c479bde296c2f7db2dea20c3d539e203cf012 Deleted: sha256:7cf939f8682c150a696f0cf0100c032be5fa5e7174acf307d0f0b4de37399f94 Deleted: sha256:91cd7053f379a5b4180efadb7ac57478a28644cda21c177df29c280b7203b181 Deleted: sha256:3d140599d0af4bb56ecf2cbca4dc3bac232d698dd82441b49d01bcc6aa9ac554 Deleted: sha256:f3c61cb5ca10d92d971e2c55789339d96f6f6aae1334c0aeb3d1cd3e6299e8cc Deleted: sha256:c5768da69d6a1bdc76592c10a5814ac48b1008d7b2e9df81f5990e5e70aae7b7 Deleted: sha256:763ac6a64f068afd061160ff77b7ab41f61aba49b554bfe39ca033fcbf4f2d3c Deleted: sha256:5d6cbe0dbcf9a675e86aa0fbedf7ed8756d557c7468d6a7c64bde7fa9e029636 S:\vulhub\vulhub\tomcat\tomcat8>docker images REPOSITORY TAG IMAGE ID CREATED SIZE ```
毛林
2025年9月15日 10:52
转发文档
收藏文档
上一篇
下一篇
手机扫码
复制链接
手机扫一扫转发分享
复制链接
Markdown文件
PDF文档(打印)
分享
链接
类型
密码
更新密码