大汉网络JCMS又一上传漏洞可被Getshell(需登陆)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: ### 详细说明: 问题出在jcms/setup/opr_upload.jsp中 该功能为导入一个更新包... [<img src="https://images.seebug.org/upload/201405/18233713c6551c8742632768350ae3f36f636880.jpg" alt="}09J$M@544J}4K%NE1W%7$G.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/18233713c6551c8742632768350ae3f36f636880.jpg) ``` CommonUploadFile upload = null; if(request.getMethod().toUpperCase().equals("POST")){ Jcms_UpdaterecordBLF blf = new Jcms_UpdaterecordBLF("1"); Jcms_Update_RecordEntity entity = new Jcms_Update_RecordEntity(); //解压路径 String strFilePath = strSysPath + "/update/"; //zip文件上传的临时目录 String strTemp = strFilePath + "temp/"; Convert.createDirectory(strTemp); //建立上传 upload = new CommonUploadFile( strTemp ,""); try{ //上传zip包 boolean bResult = upload.uploadFile(request); String[] strFileName = upload.getAllFileName(); strBakPath = upload.getFormValue("vc_bakPath"); strBakPath = Convert.getValue(strBakPath); strBakPath = (strBakPath.trim().length() == 0) ?...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息