Loading

0day-seeyonOA-zipslip(win)

Incorrect decompression exists in seeyonOA v8. An attacker can gain access to the server through zipslip after obtaining ordinary user privileges.

Route

image.png

Analyse

The vulnerability lies in WorkFlowDesignerController.class 's importProcess method, which constructs multipart upload to upload malicious zip compressed files and writes shell to the web directory via.. /

  1. get the input zipfile

image.png

  1. create the temporary file and directory

image.png
write the input to tempZipFile
image.png

  1. Extract zipfile and write to the file

image.png

CtpLocalFile newFile = new CtpLocalFile(savepath + entryName);

As can be seen from this code, the file name in the package is not checked during decompression, so that files can be written across directories.

POC

image.png
image.png
image.png

posted @ 2024-03-08 16:59  _rainyday  阅读(207)  评论(0编辑  收藏  举报