U-Mail最新版任意文件下载漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 下载了最新版的umail,发现漏洞还不少,不过上wooyun一搜索,都是以前大牛提交过了,只好另找一个了。任意文件下载,泄露系统重要敏感信息,还可导致可下载任意用户的全部邮件。u-mail的使用量就不说了,可以参考: http://www.wooyun.org/bugs/wooyun-2010-061859 ### 详细说明: 问题出现的位置是在图片预览的地方 ``` http://192.168.1.24/webmail/client/mail/index.php?module=operate&action=attach-img-preview&d_url=1.gif&type=application/octet-stream ``` 关键代码如下: ``` if ( ACTION == "attach-img-preview" ) { $download_url = $_GET['d_url']; $type = $_GET['type']; $data = get_url_data( $download_url ); header( "Content-type: ".$type ); header( "Expires: 0" ); header( "Pragma: public" ); echo $data; exit( ); } ``` zend解密出来的代码,凑合着看吧 继续跟进get_url_data,(admin/include/base_function.php) ``` function get_url_data( $_obfuscate_Il8i, $_obfuscate_5E5Av0svlQ = 1 ) { $_obfuscate_u_c = curl_init( ); curl_setopt( $_obfuscate_u_c, CURLOPT_URL, $_obfuscate_Il8i ); curl_setopt( $_obfuscate_u_c, CURLOPT_SSL_VERIFYPEER, FALSE ); curl_setopt( $_obfuscate_u_c, CURLOPT_SSL_VERIFYHOST, FALSE ); curl_setopt( $_obfuscate_u_c,...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息