Ê©ÄÍµÂµçÆøU.Motion BuilderÏÂÁî×¢ÈëÎó²îÇ徲ͨ¸æ

Ðû²¼Ê±¼ä 2019-05-22

Îó²î±àºÅºÍ¼¶±ð


CVE±àºÅ£ºCVE-2018-7841£¬£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬£¬CVSS·ÖÖµ£º9.8


Ó°Ïì°æ±¾


Schneider Electric U.Motion Builder 1.3.4¼°Ö®Ç°°æ±¾


Îó²î¸ÅÊö


Schneider Electric U.Motion BuilderÊÇ·¨¹úÊ©ÄÍµÂµçÆø£¨Schneider Electric£©¹«Ë¾µÄÒ»Ì×ÐÞ½¨ÎïÖÇÄÜÖÎÀíϵͳ¡£¡£

Schneider Electric U.Motion Builder 1.3.4¼°Ö®Ç°°æ±¾ÖеÄtrack_import_export.php¾ç±¾Öб£´æ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬¸ÃÎó²îÔ´ÓÚÍⲿÊäÈëÊý¾Ý½á¹¹²Ù×÷ϵͳ¿ÉÖ´ÐÐÏÂÁîÀú³ÌÖУ¬£¬ÍøÂçϵͳ»ò²úƷδ׼ȷ¹ýÂËÆäÖеÄÌØÊâ×Ö·û¡¢ÏÂÁîµÈ¡£¡£¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´Ðв»·¨²Ù×÷ϵͳÏÂÁî¡£¡£


Îó²îÑéÖ¤


EXP£ºhttps://www.exploit-db.com/exploits/46846
CVE-2018-7841ΪCVE-2018-7765²¹¶¡Èƹý£¬£¬U.Motion 1.3.4°üÀ¨Ò×Êܹ¥»÷µÄÎļþ/smartdomuspad/modules/reporting/track_import_export.php£¬£¬ÆäÖÐÓ¦ÓóÌÐòƾ֤ÅþÁ¬µÄobject_id½á¹¹Ò»¸öÃûΪ$ whereµÄSQliteÅÌÎÊ£¬£¬¸ÃÅÌÎÊ¿ÉÒÔͨ¹ýGET»òPOSTÌṩ£º

 

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Äã¿ÉÒÔ¿´µ½object_idÊ×Ïȱ»string_encode_for_SQLiteÒªÁìÆÊÎö£¬£¬³ýÁËɾ³ýһЩÆäËû²»¿É¶ÁµÄ×Ö·û£º

 

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


$ queryÖ®ºóÓÃÓÚŲÓÃ$ dbClient-> query£¨£©£º

 

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


query£¨£©ÒªÁì¿ÉÒÔÔÚdpaddbclient_NoDbManager_sqlite.class.phpÖÐÕÒµ½£º

 

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÔÚÕâÀ£¬Äú¿ÉÒÔ¿´µ½ÅÌÎÊ×Ö·û´®£¨°üÀ¨object_id£©ÊÇͨ¹ýÒ»¶Ñstr_replaceŲÓÃÌṩµÄ£¬£¬Ä¿µÄÊǹýÂ˵ôΣÏÕ×Ö·û£¬£¬ÀýÈç$ for UnixÏÂÁîÌæ»»£¬£¬²¢ÇÒÔÚÆ¬¶Ïĩ⣬£¬ÄúÏÖʵÉÏ¿ÉÒÔ¿´µ½ ÁíÒ»¸ö×Ö·û´®$ sqlite_cmdÓëÏÈǰ¹¹½¨µÄ$ query×Ö·û¹´Í¨½Ó£¬£¬×îºóת´ï¸øPHP exec£¨£©Å²Óᣡ£


ÏÔÈ»£¬£¬Ê©ÄÍµÂµçÆøÊÔͼͨ¹ýÒÔÏ·½·¨½â¾ö֮ǰ±¨¸æµÄÎó²îCVE-2018-7765£º

 

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÕýÈçÄú¿ÉÄÜÒѾ­²Âµ½µÄÄÇÑù£¬£¬½ö½ö¹ýÂ˵ô$ȱ·¦ÒÔ×èÖ¹ÏÂÁî×¢Èëexec£¨£©Å²Óᣡ£ Òò´Ë£¬£¬ÎªÁËÈÆ¹ýstr_replaceÐÞ¸´£¬£¬¿ÉÒÔ¼òÆÓµØÊ¹Ó÷´ÒýºÅÔËËã·û£¬£¬ÈçÒÔÏÂʾÀýÇëÇóÖÐËùʾ£º

 

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


±¬·¢Ò»¸öƯÁÁµÄ·´Ïòshell£º

 

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÐÞ¸´½¨Òé


ÏÖÔÚ³§ÉÌÔÝδÐû²¼ÐÞ¸´²½·¥½â¾ö´ËÇå¾²ÎÊÌ⣬£¬½¨ÒéʹÓôËÈí¼þµÄÓû§ËæÊ±¹Ø×¢³§ÉÌÖ÷Ò³»ò²Î¿¼ÍøÖ·ÒÔ»ñÈ¡½â¾ö²½·¥£º

https://www.rcesecurity.com/


²Î¿¼Á´½Ó


https://packetstormsecurity.com/files/152862/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html