Post

Tongda Oa V11 2 Upload Php Background File Upload Vulnerability

Tongda Oa V11 2 Upload Php Background File Upload Vulnerability

Tongda OA v11.2 upload.php background file upload vulnerability

Vulnerability Description

There is a file upload vulnerability in the background of Tongda OA v11.2, allowing malicious files to be uploaded by bypassing the blacklist, resulting in the server being attacked.

Affect Version

Tongda OA v11.2

Environment construction

Tongda OA v11.2 download link: https://cdndown.tongda2000.com/oa/2019/TDOA11.2.exe

After downloading, follow the steps to install

Vulnerability reappears

This vulnerability exists in the background and needs to be used after logging in

After logging in, click Menu -> System Management -> Attachment Management

img

Click Add Appendix to add the following storage management (the storage directory is webroot directory, default is D:/MYOA/webroot/)

img

Click Organization -> System Administrator -> Upload attachments

img

Bypass method of using windows to catch packets shell.php -> shell.php.

img

  • ✅2012 as a directory
  • ✅1717872192 The spliced ​​file name
  • ✅The last shell name is 1717872192.shell.php

img

Access Trojan files

img

This post is licensed under CC BY 4.0 by the author.