Ê©ÄÍµÂµçÆøU.Motion BuilderÏÂÁî×¢ÈëÎó²îÇ徲ͨ¸æ

Ðû²¼Ê±¼ä 2019-05-22

Îó²î±àºÅºÍ¼¶±ð


CVE±àºÅ£ºCVE-2018-7841£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬CVSS·ÖÖµ£º9.8


Ó°Ïì°æ±¾


Schneider Electric U.Motion Builder 1.3.4¼°Ö®Ç°°æ±¾


Îó²î¸ÅÊö


Schneider Electric U.Motion BuilderÊÇ·¨¹úÊ©ÄÍµÂµçÆø£¨Schneider Electric£©¹«Ë¾µÄÒ»Ì×ÐÞ½¨ÎïÖÇÄÜÖÎÀíϵͳ¡£

Schneider Electric U.Motion Builder 1.3.4¼°Ö®Ç°°æ±¾ÖеÄtrack_import_export.php¾ç±¾Öб£´æ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬¸ÃÎó²îÔ´ÓÚÍⲿÊäÈëÊý¾Ý½á¹¹²Ù×÷ϵͳ¿ÉÖ´ÐÐÏÂÁîÀú³ÌÖУ¬ÍøÂçϵͳ»ò²úƷδ׼ȷ¹ýÂËÆäÖеÄÌØÊâ×Ö·û¡¢ÏÂÁîµÈ¡£¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´Ðв»·¨²Ù×÷ϵͳÏÂÁî¡£


Îó²îÑéÖ¤


EXP£ºhttps://www.exploit-db.com/exploits/46846
CVE-2018-7841ΪCVE-2018-7765²¹¶¡Èƹý£¬U.Motion 1.3.4°üÀ¨Ò×Êܹ¥»÷µÄÎļþ/smartdomuspad/modules/reporting/track_import_export.php£¬ÆäÖÐÓ¦ÓóÌÐòƾ֤ÅþÁ¬µÄobject_id½á¹¹Ò»¸öÃûΪ$ whereµÄSQliteÅÌÎÊ£¬¸ÃÅÌÎÊ¿ÉÒÔͨ¹ýGET»òPOSTÌṩ£º

 

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Äã¿ÉÒÔ¿´µ½object_idÊ×Ïȱ»string_encode_for_SQLiteÒªÁìÆÊÎö£¬³ýÁËɾ³ýһЩÆäËû²»¿É¶ÁµÄ×Ö·û£º

 

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


$ queryÖ®ºóÓÃÓÚŲÓÃ$ dbClient-> query£¨£©£º

 

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


query£¨£©ÒªÁì¿ÉÒÔÔÚdpaddbclient_NoDbManager_sqlite.class.phpÖÐÕÒµ½£º

 

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÔÚÕâÀÄú¿ÉÒÔ¿´µ½ÅÌÎÊ×Ö·û´®£¨°üÀ¨object_id£©ÊÇͨ¹ýÒ»¶Ñstr_replaceŲÓÃÌṩµÄ£¬Ä¿µÄÊǹýÂ˵ôΣÏÕ×Ö·û£¬ÀýÈç$ for UnixÏÂÁîÌæ»»£¬²¢ÇÒÔÚÆ¬¶Ïĩ⣬ÄúÏÖʵÉÏ¿ÉÒÔ¿´µ½ ÁíÒ»¸ö×Ö·û´®$ sqlite_cmdÓëÏÈǰ¹¹½¨µÄ$ query×Ö·û¹´Í¨½Ó£¬×îºóת´ï¸øPHP exec£¨£©Å²Óá£


ÏÔÈ»£¬Ê©ÄÍµÂµçÆøÊÔͼͨ¹ýÒÔÏ·½·¨½â¾ö֮ǰ±¨¸æµÄÎó²îCVE-2018-7765£º

 

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÕýÈçÄú¿ÉÄÜÒѾ­²Âµ½µÄÄÇÑù£¬½ö½ö¹ýÂ˵ô$ȱ·¦ÒÔ×èÖ¹ÏÂÁî×¢Èëexec£¨£©Å²ÓᣠÒò´Ë£¬ÎªÁËÈÆ¹ýstr_replaceÐÞ¸´£¬¿ÉÒÔ¼òÆÓµØÊ¹Ó÷´ÒýºÅÔËËã·û£¬ÈçÒÔÏÂʾÀýÇëÇóÖÐËùʾ£º

 

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


±¬·¢Ò»¸öƯÁÁµÄ·´Ïòshell£º

 

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÐÞ¸´½¨Òé


ÏÖÔÚ³§ÉÌÔÝδÐû²¼ÐÞ¸´²½·¥½â¾ö´ËÇå¾²ÎÊÌ⣬½¨ÒéʹÓôËÈí¼þµÄÓû§ËæÊ±¹Ø×¢³§ÉÌÖ÷Ò³»ò²Î¿¼ÍøÖ·ÒÔ»ñÈ¡½â¾ö²½·¥£º

https://www.rcesecurity.com/


²Î¿¼Á´½Ó


https://packetstormsecurity.com/files/152862/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html