Post

The Background Directory Traversal Vulnerability Of Oa Beifenaction Php

The Background Directory Traversal Vulnerability Of Oa Beifenaction Php

Xinku OA beifenAction.php background directory traversal vulnerability

Vulnerability Description

The getfilerows method is called in the OA beifenAction.php file, resulting in a directory traversal vulnerability. The attacker can obtain file information on the server through the vulnerability.

Vulnerability Impact

Call OA <= 2.3.2

Network surveying and mapping

Vulnerability reappears

Login page

img

Among them, there are several users with weak passwords by default 123456

img

The vulnerable file is webmain/system/beifen/beifenAction.php

img

View the getfilerows() method in include/chajian/fileChajian.php

img

This method traverses the file name in the directory and outputs it. After logging in, sends the request packet

1
2
3
POST /index.php?a=getdatssss&m=beifen&d=system&ajaxbool=true

folder=../../

img

This post is licensed under CC BY 4.0 by the author.