漏洞描述 该漏洞是通过/api/doc/upload/uploadFile接口上传压缩文件后利用/api/systemExpAndImp/systemImport/getSystemImportModule触发zip自解压从而实现文件写入。攻击者利用此漏洞可上传webshell获取服务器权限。
相关漏洞推荐 泛微e-cology 前台SQL注入漏洞 泛微 E-Cology ognl 代码注入漏洞 泛微 E-Cology /dwr/call/plaincall/ 身份验证缺陷漏洞 ecology-ebridge-addtaste-sqli: 泛微云桥 taste/addTaste SQL注入 ecology-ifnewscheckoutbycurrentuser-dwr-sqli: 泛微 E-Cology ifnewscheckoutbycurrentuser.dwr SQL 注入 ecology-ktreeuploadaction-upload: 泛微 e-cology 任意文件上传 POC CNVD-2023-12632: 泛微 OA e-cology v9 sql 注入 POC ecology-e-office-mysql-config-leak: 泛微OA E-Office mysql_config.ini 数据库信息泄漏 POC ecology-arbitrary-file-upload: 泛微OA e-cology V9前台任意上传漏洞 POC e-cology-e-office-officeserver-file-read: 泛微OA E-Office officeserver.php 任意文件读取漏洞 POC e-cology-filedownload-directory-traversal: 泛微OA e-cology 文件下载目录遍历 POC e-cology-getsqldata-sql-inject: 泛微OA E-Cology getSqlData SQL注入漏洞 POC e-cology-hrmcareerapplyperview-sqli: 泛微OA E-Cology HrmCareerApplyPerView.jsp SQL注入漏洞