wanhuoa-smartupload-file-upload: Wanhu OA smartUpload.jsp - Arbitrary File Upload

日期: 2025-08-01 | 影响软件: Wanhu OA | POC: 已公开

漏洞描述

Wanhu OA smartUpload.jsp file has a file upload interface and does not filter file types, resulting in arbitrary file upload vulnerabilities. Malicious JSP files can be uploaded directly.

PoC代码[已公开]

id: wanhuoa-smartupload-file-upload

info:
  name: Wanhu OA smartUpload.jsp - Arbitrary File Upload
  author: SleepingBag945
  severity: critical
  description: |
    Wanhu OA smartUpload.jsp file has a file upload interface and does not filter file types, resulting in arbitrary file upload vulnerabilities. Malicious JSP files can be uploaded directly.
  reference:
    - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/90103c248a2c52bb0a060d0ee95d5a67e4579c3d/docs/wiki/oa/%E4%B8%87%E6%88%B7OA/%E4%B8%87%E6%88%B7OA%20smartUpload.jsp%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md?plain=1#L24
  metadata:
    verified: true
    max-request: 1
    fofa-query: app="万户网络-ezOFFICE"
  tags: wanhu,oa,smartupload,file-upload,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/defaultroot/extension/smartUpload.jsp?path=information&fileName=infoPicName&saveName=infoPicSaveName&tableName=infoPicTable&fileMaxSize=0&fileMaxNum=0&fileType=gif,jpg,bmp,jsp,png&fileMinWidth=0&fileMinHeight=0&fileMaxWidth=0&fileMaxHeight=0"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "请选择要上传的文件"
          - "<TITLE>上传附件</TITLE>"
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100f9a2fced2763f98d32131e0d29d4113e01c6ab71eff11c2bcf8c19da50369adc022100fa758dceaa3d4ee6a9af4936949977b97128786a970ed862708629bed5e849b3:922c64590222798bb761d5b6d8e72950

相关漏洞推荐