Ê©ÄÍµÂµçÆøU.Motion BuilderºÅÁî×¢Èë·ì϶°²È«¹«¸æ

°ä²¼¹¦·ò 2019-05-22

·ì϶±àºÅºÍ¼¶±ð


CVE±àºÅ£ºCVE-2018-7841 £¬Î£ÏÕ¼¶±ð£ºÑϳÁ £¬CVSS·ÖÖµ£º9.8


Ó°Ïì°æ±¾


Schneider Electric U.Motion Builder 1.3.4¼°Ö®Ç°°æ±¾


·ì϶¸ÅÊö


Schneider Electric U.Motion BuilderÊÇ·¨¹úÊ©ÄÍµÂµçÆø£¨Schneider Electric£©¹«Ë¾µÄÒ»Ì×¹¹ÖþÎïÖÇÄÜÖÎÀíϵͳ¡£

Schneider Electric U.Motion Builder 1.3.4¼°Ö®Ç°°æ±¾ÖеÄtrack_import_export.php¾ç±¾ÖдæÔÚ²Ù×÷ϵͳºÅÁî×¢Èë·ì϶ £¬¸Ã·ì϶ԴÓÚ±í²¿ÊäÈëÊý¾Ý»ú¹Ø²Ù×÷ϵͳ¿ÉÖ´ÐкÅÁî¹ý³ÌÖÐ £¬ÍøÂçϵͳ»ò²úƷδÕýÈ·¹ýÂËÆäÖеÄÌØÊâ×Ö·û¡¢ºÅÁîµÈ¡£¹¥»÷Õß¿ÉÀûÓø÷ì϶ִÐз¸·¨²Ù×÷ϵͳºÅÁî¡£


·ì϶ÑéÖ¤


EXP£ºhttps://www.exploit-db.com/exploits/46846
CVE-2018-7841ΪCVE-2018-7765²¹¶¡Èƹý £¬U.Motion 1.3.4Ô̺¬Ò×Êܹ¥»÷µÄÎļþ/smartdomuspad/modules/reporting/track_import_export.php £¬ÆäÖÐÀûÓ÷¨Ê½Æ¾¾ÝÏνӵÄobject_id»ú¹ØÒ»¸öÃûΪ$ whereµÄSQlite²éÎÊ £¬¸Ã²éÎÊÄܹ»Í¨¹ýGET»òPOSTÌṩ£º

 

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÄãÄܹ»¿´µ½object_idÊ×Ïȱ»string_encode_for_SQLite²½Öè½âÎö £¬³ýÁËɾ³ýһЩÆäËû²»³É¶ÁµÄ×Ö·û£º

 

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


$ queryÖ®ºóÓÃÓÚŲÓÃ$ dbClient-> query£¨£©£º

 

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


query£¨£©²½ÖèÄܹ»ÔÚdpaddbclient_NoDbManager_sqlite.class.phpÖÐÕÒµ½£º

 

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚÕâÀï £¬ÄúÄܹ»¿´µ½²éÎÊ×Ö·û´®£¨Ô̺¬object_id£©ÊÇͨ¹ýÒ»¶Ñstr_replaceŲÓÃÌṩµÄ £¬Ö÷ÕÅÊǹýÂ˵ôΣÏÕ×Ö·û £¬ÀýÈç$ for UnixºÅÁî´úÌæ £¬²¢ÇÒÔÚÆ¬¶Îĩβ £¬ÄúÏÖʵÉÏÄܹ»¿´µ½ ÁíÒ»¸ö×Ö·û´®$ sqlite_cmdÓëÏÈǰ¹¹½¨µÄ$ query×Ö·û´®ÏνÓ £¬×îºó´«µÝ¸øPHP exec£¨£©Å²Óá£


ÏÔÈ» £¬Ê©ÄÍµÂµçÆøÊÔͼͨ¹ýÒÔÏ·½Ê½½â¾ö֮ǰ»ã±¨µÄ·ì϶CVE-2018-7765£º

 

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÕýÈçÄú¿ÉÄÜÒѾ­²Âµ½µÄÄÇÑù £¬½ö½ö¹ýÂ˵ô$²»¼°ÒÔ×èÖ¹ºÅÁî×¢Èëexec£¨£©Å²ÓᣠÒò¶ø £¬ÎªÁËÈÆ¹ýstr_replace½¨¸´ £¬Äܹ»µ¥Ò»µØÊ¹Ó÷´ÒýºÅÔËËã·û £¬ÈçÒÔÏÂʾÀýÒªÇóÖÐËùʾ£º

 

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


²úÉúÒ»¸öÃÀÀöµÄ·´Ïòshell£º

 

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


½¨¸´½¨Òé


Ŀǰ³§ÉÌÔÝδ°ä²¼½¨¸´´ëÊ©½â¾ö´Ë°²È«ÎÊÌâ £¬½¨ÒéʹÓôËÈí¼þµÄÓû§ËæÊ±¹Ø×¢³§ÉÌÖ÷Ò³»ò²Î¿¼ÍøÖ·ÒÔ»ñÈ¡½â¾ö·¨×Ó£º

https://www.rcesecurity.com/


²Î¿¼Á´½Ó


https://packetstormsecurity.com/files/152862/Schneider-Electric-U.Motion-Builder-1.3.4-Command-Injection.html