Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-4257: VulnHub/rce1.md at main · siriuswhiter/VulnHub

A vulnerability was found in C-DATA Web Management System. It has been rated as critical. This issue affects some unknown processing of the file cgi-bin/jumpto.php of the component GET Parameter Handler. The manipulation of the argument hostname leads to argument injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214631.

CVE
#vulnerability#web#php#wifi

C-Data Wi-Fi Web管理系统存在未授权RCE漏洞****一、漏洞描述

    C-Data是一家提供主流接入网技术所需全线产品的高科技企业。在中国市场,C-Data拥有电信、广电、驻地网运营商、系统集成商等众多品牌客户,产品销售更是覆盖世界各地,在南美洲、非洲、东欧、东南亚、亚太地区近百个国家的运营商网络、企业网络中得到了广泛应用。

    而其提供的Wi-Fi Web管理系统存在未授权远程代码执行漏洞,攻击者通过漏洞可以获取服务器权限。

二、定位漏洞点

在cgi-bin 目录下 jumpto.php 可以通过拼接GET参数,跳转到同级目录下的php或html文件

同级目录中的diagnosis目录下的diagnosis_config_save.php文件中提供了ping功能,其代码如下:

在指定call_function为ping时,该函数接受post的iface参数与hostname参数,拼接指令并执行。然而此处对传进来的iface与hostname参数都没有进行校验,因此可以通过构造阶段从而实现任意命令执行。

三、漏洞利用

根据漏洞点构造发包请求,将其设置为POST请求包,

设置GET参数使得能够从jumpto.php跳转到diagnosis_config_save.php

cgi-bin/jumpto.php?class=diagnosis&page=config_save&isphp=1

设置POST参数使得可以执行ping命令并对其截断从而执行任意命令

call_function=ping&iface=eth0&hostname=127.0.0.1;cmd

漏洞利用结果如下,成功执行id指令,返回被攻击端的用户id:

Related news

Mirai Variant V3G4 Exploiting IoT Devices for DDoS Attacks

By Waqas The V3G4 malware was caught leveraging several vulnerabilities in IoT devices to spread its infection from July to December of 2022. This is a post from HackRead.com Read the original post: Mirai Variant V3G4 Exploiting IoT Devices for DDoS Attacks

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907