-
Notifications
You must be signed in to change notification settings - Fork 267
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unverified Vulnerability Causes Command Execution #12
Comments
该漏洞是后台的一个设置修改处的未校验漏洞,可以任意配置后缀名并写入到数据库中,上传文件的时候会从数据库中调取被允许的后缀名,从而绕过上传限制。上传可执行命令的jsp,进而控制整台服务器 选择上传文件 登陆 修改数据包,添加一个jsp后缀 登陆普通用户继续上传 |
由于准备申请cve所以该issue提了英文版先,请见谅,已附上中文细节,从白盒的角度也分析了一部分细节,作者应该比我更加清楚整个框架,若有需要我可以将整个漏洞流程细节从白盒审计的角度进行的分析工作贴上来。 |
放开jsp文件扩展名限制需要管理员账户操作才行,实际使用中管理员账户可以操作全站数据,这个问题要形成安全漏洞需要管理员蓄意而为才行。后续的版本会对比限制设置页面提交的扩展名和配置文件预设的扩展名 |
是的,你说的对,需要高权限用户如admin才能操作,所以这个漏洞的利用条件相对高了一些,实际上大多数情况下存在管理员账户密码设置较为简单而被爆破密码成功的情况。另外很感谢作者的回复,虽然利用起来比较鸡肋了 |
(1)
Log in as a normal user, post, and you cannot upload a jsp file when posting a topic
jsp file is not allowed to upload
(2)
After logging in to the management page as an administrator user, modify the configuration information to allow uploading files with jsp extension
Select basic configuration
Select Submit and use tool to intercept packets
Modify parameters to add jsp suffix
(3)
Log in as a normal user, add theme, add attachments, select jsp files with malicious command execution functions to upload
Execute system command “whoami”
The text was updated successfully, but these errors were encountered: