Post

Jinhe Oa C6 Openfile Aspx Background Overriding Sensitive File Traversal Vulnerability

Jinhe Oa C6 Openfile Aspx Background Overriding Sensitive File Traversal Vulnerability

Jinhe OA C6 OpenFile.aspx background overriding sensitive file traversal vulnerability

Vulnerability Description

Jinhe OA C6 has a background overriding sensitive file traversal vulnerability. Ordinary users can obtain sensitive files uploaded by other users by traversing special parameters.

Vulnerability Impact

Kin and OA C6

Network surveying and mapping

app=”Jinher-OA”

Vulnerability reappears

Default user password: admin/000000

After logging in, click on the information exchange and initiate a collaborative page

img

Upload attachments and upload to the target. Here, the login permission is the administrator. We just send it to ourselves. The previous article only shows the process of exploiting vulnerabilities.

img

Successfully received the uploaded attachment

img

Click to catch the packet when viewing, and find a request packet with file ID

img

Several parameters returned

var strFilePath = '../Resource/slaves/1/8b473ecb-7b39-4384-ada2-b0ec72c4f6ed.png';
var strFileType = 'png';
var strSid='3jvpvhs410m2wdbbficax5q5';
var strFileIDCode='us9w7xWE7do=';
var strId = '1229';
var strTxtReg = 'txt,ini,xml,config,htm,html,js,css,asp,aspx,jsp,cs,sql,inf,htc,log';
var strImgReg = 'jpg,gif,jpeg,png,ico';
var MD = '';

We noticed that strFilePath is the storage address of the file. We changed the id parameter to another value, and after testing, we found that the name file name parameter does not matter.

img

After changing the ID, send the request packet and find information about another file

Access Url, note that the type parameter needs to be the correct file suffix to access it.

https://xxx.xxx.xxx.xxx/C6/control/OpenFile.aspx?id=1200&name=&type=pdf

img

Here, if it is feasible to replace an ordinary user, try to traverse the id

img

img

If the existence of strFilePath parameter is a file, and if it is empty, it means that the file no longer exists.

At the same time, you can also see the parameters that can be obtained on the page of catching the package and downloading the file.

FileID and FileIDCode

img

So you only need to use the ID traversal just now and get two key parameters to download the sensitive file sent by others, and only ordinary user permissions are required.

This post is licensed under CC BY 4.0 by the author.