From 4492f61033cb66f6868ce79ab650ba8aa7a1703e Mon Sep 17 00:00:00 2001 From: Goby <50955360+gobysec@users.noreply.github.com> Date: Fri, 14 Jul 2023 11:27:17 +0800 Subject: [PATCH] Create 91skzy_Enterprise_process_control_system_formservice_File_Upload_vulnerability.md add 91skzy Enterprise process control system formservice File Upload vulnerability --- ...l_system_formservice_File_Upload_vulnerability.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 91skzy_Enterprise_process_control_system_formservice_File_Upload_vulnerability.md diff --git a/91skzy_Enterprise_process_control_system_formservice_File_Upload_vulnerability.md b/91skzy_Enterprise_process_control_system_formservice_File_Upload_vulnerability.md new file mode 100644 index 0000000..907d217 --- /dev/null +++ b/91skzy_Enterprise_process_control_system_formservice_File_Upload_vulnerability.md @@ -0,0 +1,12 @@ +## 91skzy Enterprise process control system formservice File Upload vulnerability + +| **Vulnerability** | **91skzy Enterprise process control system formservice File Upload vulnerability** | +| :----: | :-----| +| **Chinese name** | 时空智友企业流程化管控系统 formservice 文件上传漏洞 | +| **CVSS core** | 9.0 | +| **FOFA Query** (click to view the results directly)| [body="企业流程化管控系统" && body="密码(Password):"](https://en.fofa.info/result?qbase64=Ym9keT0i5LyB5Lia5rWB56iL5YyW566h5o6n57O757ufIiAmJiBib2R5PSLlr4bnoIEoUGFzc3dvcmQpOiI%3D) | +| **Number of assets affected** | 1467 | +| **Description** | Spatiotemporal Intelligent Friend enterprise process management and control system is a system that uses JAVA development to provide process management and control for enterprises.Spatiotemporal Zhiyou enterprise process control system formservice file upload vulnerability, attackers can use the vulnerability to obtain system permissions. | +| **Impact** | Spatiotemporal Zhiyou enterprise process control system formservice file upload vulnerability, attackers can use the vulnerability to obtain system permissions. | + +![](https://s3.bmp.ovh/imgs/2023/07/14/5b49872a996cbd1e.gif)