大汉版通某系统文件上传导致任意代码执行

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 大汉版通某个系统存在两处文件上传,可Getshell ### 详细说明: #1 漏洞文件 总共存在两处文件上传,路径如下 ``` /xxgk/m_5_5/m_5_5_3/upload.jsp /xxgk/m_5_5/m_5_5_3/import_style.jsp ``` 选择其一贴下漏洞代码 ``` <% ListTable listtable = new ListTable(request); out.println(listtable.getListTableCssJs()); sys.initSysPara(request); //*得到用户信息*/ Merp_Pub_UserEntity userentity = UserRightBLF.getUserInfo(request); String strFilePath = application.getRealPath("") + "/m_5_5/m_5_5_3/temphttps://images.seebug.org/upload/";//上传文件保存的路径 Convert.createDirectory(strFilePath); CommonUploadFile upload = new CommonUploadFile(strFilePath, ""); boolean bl = false; String[] strFiles = null; try { SysInit.init(); if (SysInit.m_strImportNoFileType == null) { upload.setM_Notfiletype("exe,com,bat,php,asp,php3,phtml,jsp,aspx"); } else { upload.setM_Notfiletype(SysInit.m_strImportNoFileType); } bl = upload.uploadFile(request); } catch (Exception e) { } if (bl) { StyleParse sp = new StyleParse(sys.appId, sys.webId); sp.setUserentity(userentity); String...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息