From 65771f74e8e5122b6e10a649f25cca20a341c81d Mon Sep 17 00:00:00 2001 From: Goby <50955360+gobysec@users.noreply.github.com> Date: Thu, 30 Mar 2023 19:34:21 +0800 Subject: [PATCH] Create Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability.md --- ...B2 JDBC Arbitrary Code Execution Vulnerability.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability.md diff --git a/Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability.md b/Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability.md new file mode 100644 index 0000000..aad9d8d --- /dev/null +++ b/Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability.md @@ -0,0 +1,12 @@ +## Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability + +| **Vulnerability** | **Smartbi DB2 JDBC Arbitrary Code Execution Vulnerability** | +| :----: | :-----| +| **Chinese name** |Smartbi DB2 JDBC 任意代码执行漏洞 | +| **CVSS core** | 9.8 | +| **FOFA Query** (click to view the results directly)| [(body="gcfutil = jsloader.resolve('smartbi.gcf.gcfutil')") || body="gcfutil = jsloader.resolve('smartbi.gcf.gcfutil')"](https://fofa.info/result?qbase64=KGJvZHk9ImdjZnV0aWwgPSBqc2xvYWRlci5yZXNvbHZlKCdzbWFydGJpLmdjZi5nY2Z1dGlsJykiKSB8fCBib2R5PSJnY2Z1dGlsID0ganNsb2FkZXIucmVzb2x2ZSgnc21hcnRiaS5nY2YuZ2NmdXRpbCcpIg%3D%3D) | +| **Number of assets affected** | 291 | +| **Description** | Smartbi is a business intelligence BI software launched by Smart Software, which meets the development stage of BI products. | +| **Impact** | There is an unauthorized access background interface vulnerability between Smartbi V7 and V10.5.8. Combining DB2 JDBC exploitation and bypassing defense checks can lead to JNDI injection vulnerabilities, executing arbitrary code, and obtaining server privileges. | + +![](https://s3.bmp.ovh/imgs/2023/03/30/8258465c5b97a719.gif)