### 简要描述: ### 详细说明: 上一枚: [WooYun: 用友某办公平台任意文件上传导致代码执行漏洞(全版本)](http://www.wooyun.org/bugs/wooyun-2014-060671) intitle:"fe协作" 看问题代码 在\system\mediafile\fileupload.jsp中 ``` None ``` shell直接在根目录当中,为test.jsp http://oa.peizheng.net.cn/test.jsp [<img src="https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg" alt="]XJRNIREAU[83[2WMXXXSFJ.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg) ### 漏洞证明: http://oa.peizheng.net.cn/test.jsp [<img src="https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg" alt="]XJRNIREAU[83[2WMXXXSFJ.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg)
### 简要描述: ### 详细说明: 上一枚: [WooYun: 用友某办公平台任意文件上传导致代码执行漏洞(全版本)](http://www.wooyun.org/bugs/wooyun-2014-060671) intitle:"fe协作" 看问题代码 在\system\mediafile\fileupload.jsp中 ``` None ``` shell直接在根目录当中,为test.jsp http://oa.peizheng.net.cn/test.jsp [<img src="https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg" alt="]XJRNIREAU[83[2WMXXXSFJ.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg) ### 漏洞证明: http://oa.peizheng.net.cn/test.jsp [<img src="https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg" alt="]XJRNIREAU[83[2WMXXXSFJ.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg)