### 简要描述:
rt
### 详细说明:
某农资市场监管系统远程命令执行漏洞。
案例:
http://116.252.222.36:8080/aic/webnz/welcome-web-home!welcome.action
http://61.133.211.45:8088/aic/webnz/welcome-web-home!welcome.action
http://www.nmgs.gov.cn:7005/aic/webnz/welcome-web-home!welcome.action
http://221.7.12.181:8080/aic/webnz/welcome-web-home!welcome.action
http://61.178.8.155:8080/aic/webnz/welcome-web-home!welcome.action
### 漏洞证明:
漏洞证明:
http://116.252.222.36:8080/aic/webnz/welcome-web-home!welcome.action
存在远程命令执行,权限administrator。
[<img src="https://images.seebug.org/upload/201506/101111225b3846cad73a25fb5e02f2a7a8957dfe.png" alt="QQ图片20150610102342.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/101111225b3846cad73a25fb5e02f2a7a8957dfe.png)
[<img src="https://images.seebug.org/upload/201506/101111306e6c39c0231d9876c8f855df653350cf.png" alt="QQ图片20150610102356.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/101111306e6c39c0231d9876c8f855df653350cf.png)
文件上传可getshell:
[<img src="https://images.seebug.org/upload/201506/10111143dfcfc91534a27c30c8a35bb659bd8e31.png" alt="QQ图片20150610102411.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201506/10111143dfcfc91534a27c30c8a35bb659bd8e31.png)
暂无评论