CVE-2022-38130: KeySight RF – smsRestoreDatabaseZip UNC path to Remote Code Execution

CVE-2022-38130: KeySight RF - smsRestoreDatabaseZip UNC path to Remote Code Execution-渗透云记 - 专注于网络安全与技术分享
CVE-2022-38130: KeySight RF – smsRestoreDatabaseZip UNC path to Remote Code Execution
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2022-38130: KeySight RF – smsRestoreDatabaseZip UNC path to Remote Code Execution

漏洞描述

The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享