Create Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability.md

This commit is contained in:
Goby 2023-03-30 19:34:21 +08:00 committed by GitHub
parent 33de4d9add
commit 65771f74e8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -0,0 +1,12 @@
## Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability
| **Vulnerability** | **Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability** |
| :----: | :-----|
| **Chinese name** |Smartbi DB2 JDBC 任意代码执行漏洞 |
| **CVSS core** | 9.8 |
| **FOFA Query** (click to view the results directly)| [(body="gcfutil = jsloader.resolve('smartbi.gcf.gcfutil')") || body="gcfutil = jsloader.resolve('smartbi.gcf.gcfutil')"](https://fofa.info/result?qbase64=KGJvZHk9ImdjZnV0aWwgPSBqc2xvYWRlci5yZXNvbHZlKCdzbWFydGJpLmdjZi5nY2Z1dGlsJykiKSB8fCBib2R5PSJnY2Z1dGlsID0ganNsb2FkZXIucmVzb2x2ZSgnc21hcnRiaS5nY2YuZ2NmdXRpbCcpIg%3D%3D) |
| **Number of assets affected** | 291 |
| **Description** | Smartbi is a business intelligence BI software launched by Smart Software, which meets the development stage of BI products. |
| **Impact** | There is an unauthorized access background interface vulnerability between Smartbi V7 and V10.5.8. Combining DB2 JDBC exploitation and bypassing defense checks can lead to JNDI injection vulnerabilities, executing arbitrary code, and obtaining server privileges. |
![](https://s3.bmp.ovh/imgs/2023/03/30/8258465c5b97a719.gif)