### 简要描述: 大汉网络无条件GetShell漏洞 ### 详细说明: 漏洞地址: /vc/vc/index/que_index.jsp 过程演示: [<img src="https://images.seebug.org/upload/201501/1700074655fdbc30ad20773321a6bd154be57860.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1700074655fdbc30ad20773321a6bd154be57860.png) 根据提示构造zip包 [<img src="https://images.seebug.org/upload/201501/1700081493327486c14701ea174a758556f24f94.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1700081493327486c14701ea174a758556f24f94.png) default.html 页面填写相应内容。 [<img src="https://images.seebug.org/upload/201501/17000841d66ae96b408f4d457c19eacf7e520f89.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/17000841d66ae96b408f4d457c19eacf7e520f89.png) 上传zip包,上传成功。 [<img src="https://images.seebug.org/upload/201501/17000906cbe43a58f84343a1661c208ac81b2bc4.png" alt="1.png" width="600"...
### 简要描述: 大汉网络无条件GetShell漏洞 ### 详细说明: 漏洞地址: /vc/vc/index/que_index.jsp 过程演示: [<img src="https://images.seebug.org/upload/201501/1700074655fdbc30ad20773321a6bd154be57860.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1700074655fdbc30ad20773321a6bd154be57860.png) 根据提示构造zip包 [<img src="https://images.seebug.org/upload/201501/1700081493327486c14701ea174a758556f24f94.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1700081493327486c14701ea174a758556f24f94.png) default.html 页面填写相应内容。 [<img src="https://images.seebug.org/upload/201501/17000841d66ae96b408f4d457c19eacf7e520f89.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/17000841d66ae96b408f4d457c19eacf7e520f89.png) 上传zip包,上传成功。 [<img src="https://images.seebug.org/upload/201501/17000906cbe43a58f84343a1661c208ac81b2bc4.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/17000906cbe43a58f84343a1661c208ac81b2bc4.png) 成功上传WebShell, 访问地址:http://www.njhdgcj.com/vc/vc/htmlhttps://images.seebug.org/upload/j.jsp [<img src="https://images.seebug.org/upload/201501/1700093038b1722c24ae79bbe20c22866587ffb5.png" alt="clipboard.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1700093038b1722c24ae79bbe20c22866587ffb5.png) ### 漏洞证明: 案例: 长江南京航道工程局 http://www.njhdgcj.com/vc/vc/index/que_index.jsp 浙江审计厅 http://122.224.88.252/vc/vc/index/que_index.jsp 启动政府 http://www.qidong.gov.cn//vc/vc/index/que_index.jsp 中共江苏省委党校 http://www.sdx.js.cn/vc/vc/index/que_index.jsp 济南天桥 http://www.tianqiao.gov.cn/vc/vc/index/que_index.jsp