漏洞描述 该漏洞存在于泛微e-cology的/api/doc/atom/confirmDoMergeNew接口,可修改imagefile表中的其他字段,泛微的文件上传会存放到这个表里,并且将文件全路径放到filerealpath中,文件下载的时候,会根据filerealpath读取路径。攻击者可利用此漏洞读取服务器中任意文件。
相关漏洞推荐 泛微e-cology 前台SQL注入漏洞 泛微 E-Cology ognl 代码注入漏洞 泛微 E-Cology /dwr/call/plaincall/ 身份验证缺陷漏洞 ecology-ebridge-addtaste-sqli: 泛微云桥 taste/addTaste SQL注入 ecology-ifnewscheckoutbycurrentuser-dwr-sqli: 泛微 E-Cology ifnewscheckoutbycurrentuser.dwr SQL 注入 ecology-ktreeuploadaction-upload: 泛微 e-cology 任意文件上传 POC CNVD-2023-12632: 泛微 OA e-cology v9 sql 注入 POC ecology-e-office-mysql-config-leak: 泛微OA E-Office mysql_config.ini 数据库信息泄漏 POC ecology-arbitrary-file-upload: 泛微OA e-cology V9前台任意上传漏洞 POC e-cology-e-office-officeserver-file-read: 泛微OA E-Office officeserver.php 任意文件读取漏洞 POC e-cology-filedownload-directory-traversal: 泛微OA e-cology 文件下载目录遍历 POC e-cology-getsqldata-sql-inject: 泛微OA E-Cology getSqlData SQL注入漏洞 POC e-cology-hrmcareerapplyperview-sqli: 泛微OA E-Cology HrmCareerApplyPerView.jsp SQL注入漏洞