Goby/json/Panabit-Panalog-sy_addmount...

69 lines
3.6 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Panabit Panalog sy_addmount.php RCE",
"Description": "<p>Panalog is a log audit system, which is convenient for users to centrally monitor and manage massive Panabit devices on the network.</p><p>Panalog log audit system sy_addmount.php file has a remote command execution vulnerability. Attackers can execute arbitrary commands to take over server permissions.</p>",
"Product": "Panalog",
"Homepage": "https://www.panabit.com/",
"DisclosureDate": "2021-10-20",
"Author": "1291904552@qq.com",
"FofaQuery": "app=\"Panabit-Panalog\"||app=\"Panabit-Panalog日志系统\"",
"GobyQuery": "app=\"Panabit-Panalog\"||app=\"Panabit-Panalog日志系统\"",
"Level": "2",
"Impact": "<p>Panalog log audit system sy_addmount.php file has a remote command execution vulnerability. Attackers can execute arbitrary commands to take over server permissions.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://www.panabit.com\">https://www.panabit.com/</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "Panalog 日志审计系统 sy_addmount.php 文件存在远程命令执行漏洞",
"Product": "Panalog",
"VulType": ["命令执行"],
"Tags": ["命令执行"],
"Description": "<p>Panalog是一款日志审计系统方便用户统一集中监控、管理在网的海量设备。</p><p>Panalog日志审计系统 sy_addmount.php文件存在远程命令执行漏洞攻击者可执行任意命令接管服务器权限。</p>",
"Impact": "<p>Panalog日志审计系统 sy_addmount.php文件存在远程代码执行漏洞攻击者可执行任意命令接管服务器权限。</p>",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新: <a href=\"https://www.panabit.com\">https://www.panabit.com</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "Panabit Panalog sy_addmount.php RCE",
"Product": "Panalog",
"VulType": ["rce"],
"Tags": ["rce"],
"Description": "<p>Panalog is a log audit system, which is convenient for users to centrally monitor and manage massive Panabit devices on the network.</p><p>Panalog log audit system sy_addmount.php file has a remote command execution vulnerability. Attackers can execute arbitrary commands to take over server permissions.</p>",
"Impact": "<p>Panalog log audit system sy_addmount.php file has a remote command execution vulnerability. Attackers can execute arbitrary commands to take over server permissions.</p>",
"Recommendation": "<p>There is currently no detailed solution provided, please pay attention to the manufacturer's homepage update: <a href=\"https://www.panabit.com\">https://www.panabit.com</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2. If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://fofa.so"
],
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "id"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"rce"
],
"VulType": [
"rce"
],
"CVEIDs": [
""
],
"CVSSScore": "8.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": ["Panalog"],
"Hardware": null
},
"CNNVD": [
""
],
"CNVD": [
""
]
}