TRSWCM 文件读取漏洞通杀较新版本(二)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 貌似是后续更新的时候添加的一个功能,通杀较新版本。 ### 详细说明: 其实还是XML实体注入,不过这次是用的DOM解析XML。 web.xml中配置的Servlet ReceiveMASServlet: ``` <servlet> <servlet-name>ReceiveMASServlet</servlet-name> <servlet-class>com.trs.components.video.ReceiveMASServlet</servlet-class> </servlet> <servlet-mapping> <servlet-name>ReceiveMASServlet</servlet-name> <url-pattern>/app/video/ReceiveMASServlet</url-pattern> </servlet-mapping> ``` 对应的com/trscomponents/video/ReceiveMASServlet.java代码如下: ``` protected void service(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { String event = request.getParameter("event"); String string = request.getParameter("pushInfo"); LOG.info("push event: " + event); LOG.info("push pushInfo: " + string); if (string != null) { Element root = SimpleConsoleLogger.parserXml(string);//解析XML入口 if (root.element("time") != null || "time".equals(root.element("time"))) { ``` 获取pushInfo参数的数值,然后SimpleConsoleLogger.parserXml()解析XML,方法如下: ``` public static...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息