diff --git a/Ruiyou_Tianyi_Application_Virtualization_System_Index.php_File_Remote_Code_Execution_Vulnerability.md b/Ruiyou_Tianyi_Application_Virtualization_System_Index.php_File_Remote_Code_Execution_Vulnerability.md new file mode 100644 index 0000000..9e3095c --- /dev/null +++ b/Ruiyou_Tianyi_Application_Virtualization_System_Index.php_File_Remote_Code_Execution_Vulnerability.md @@ -0,0 +1,12 @@ +## Ruiyou Tianyi Application Virtualization System Index.php File Remote Code Execution Vulnerability + +| **Vulnerability** | **Ruiyou Tianyi Application Virtualization System Index.php File Remote Code Execution Vulnerability** | +| :----: | :-----| +| **Chinese name** | 瑞友天翼应用虚拟化系统 index.php 文件远程代码执行漏洞 | +| **CVSS core** | 9.3 | +| **FOFA Query** (click to view the results directly)| [body="瑞友应用虚拟化系统" \|\| body="CASMain.XGI?cmd=" \|\| body="瑞友天翼-应用虚拟化系统" \|\| body="DownLoad.XGI?pram="](https://en.fofa.info/result?qbase64=Ym9keT0i55Ge5Y%2BL5bqU55So6Jma5ouf5YyW57O757ufIiB8fCBib2R5PSJDQVNNYWluLlhHST9jbWQ9IiB8fCBib2R5PSLnkZ7lj4vlpKnnv7zvvI3lupTnlKjomZrmi5%2FljJbns7vnu58iIHx8IGJvZHk9IkRvd25Mb2FkLlhHST9wcmFtPSI%3D) | +| **Number of assets affected** | 61711 | +| **Description** | Ruiyou Tianyi Application Virtualization System Remote Code Execution Vulnerability Intelligence (0day) allows attackers to execute arbitrary code through this vulnerability, resulting in the system being attacked and controlled. The Ruiyou Tianyi Application Virtualization System is an application virtualization platform based on server computing architecture. It centrally deploys various user application software to the Ruiyou Tianyi service cluster, and clients can access authorized application software on the server through the WEB, achieving centralized application, remote access, collaborative office, and more. Attackers can use this vulnerability to arbitrarily execute code on the server side, write backdoors, obtain server permissions, and then control the entire web server. | +| **Impact** | Attackers can use this vulnerability to arbitrarily execute code on the server side, write backdoors, obtain server permissions, and then control the entire web server. | + +![](https://s3.bmp.ovh/imgs/2023/04/11/ad85ca285f103af4.gif)