menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right Kyan chevron_right Kyan 网络监控设备 run.php 远程命令执行漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Kyan 网络监控设备 run.php 远程命令执行漏洞.md
    2.48 KB / 2021-07-04 06:01:08
        # Kyan 网络监控设备 run.php 远程命令执行漏洞
    
    ## 漏洞描述
    
    Kyan 网络监控设备 run.php可在身份验证的情况下执行任意命令, 配合账号密码泄露漏洞,可以获取服务器权限,存在远程命令执行漏洞
    
    ## 漏洞影响
    
    > [!NOTE]
    >
    > Kyan
    
    ## FOFA
    
    > [!NOTE]
    >
    > title="platform - Login"
    
    ## 漏洞复现
    
    登录页面如下
    
    ![](http://wikioss.peiqi.tech/vuln/ky-1.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    使用 Gobuster扫描文件
    
    ![image-20210605093752342](http://wikioss.peiqi.tech/vuln/image-20210605093752342.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    其中 run.php 文件内容为
    
    ```php
    <?php 
    require_once 'functions.php';
    require_once 'international.php';
    session_start();
    auth_check();
    print_html_begin('run');
    ?>
    <body link="#000000" vlink="#000000" alink="#000000" bgcolor="#FFFFFF">
    
    <form method="post">
    <table border="1" cellpadding="0" cellspacing="0" style="border-collapse: collapse" width="100%" id="AutoNumber1" height="25" bordercolor="#000000">
        <tr>
          <td width="100%" height="25" bgcolor="#FCFEBA">
          <p align="center"><font face="Verdana" size="2"> Shell Execute </font></td>
        </tr>
        <tr>
          <td width="100%" height="25" bgcolor="#FCFEBA">
                <div align="center">
                  <textarea name="command" rows="2" cols="100" ><?php echo $_POST['command']; ?>
                  </textarea> 
            </div></td>
        </tr>
        <tr>
          <td width="100%" height="25" bgcolor="#FCFEBA">
            <div align="center">
              <input type="submit" value="Execute">
              </div></td>
        </tr>
        <tr>
          <td width="100%" height="25" bgcolor="#FCFEBA">
            <div align="center">
              <textarea name="textarea" cols="100" rows="50" readonly><?php @$output = system(trim($_POST['command'])); ?>
              </textarea>
            </div></td>
        </tr>
    </table>
    </form>
    </body> 
    <?php
    print_html_end(); 
    ?>
    
    ```
    
    ![image-20210605103631166](http://wikioss.peiqi.tech/vuln/image-20210605103631166.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    links
    file_download