U-Mail邮件系统上传文件缺陷导致暴力getshell

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: U-Mail邮件系统某处上传缺陷,导致可以暴力获取webshell ### 详细说明: 漏洞文件:C:\umail\WorldClient\html\client\mail\module\o_attach.php 代码: ``` if ( ACTION == "attach-upload" ) { if ( $_FILES ) { $file_name = $_FILES['Filedata']['name']; $file_type = $_FILES['Filedata']['type']; $file_size = $_FILES['Filedata']['size']; $file_source = $_FILES['Filedata']['tmp_name']; $file_suffix = getfilenamesuffix( $file_name ); $path_target = getusercachepath( ); do { $file_id = makerandomname( ); $file_target = $path_target.$file_id.".".$file_suffix; } while ( file_exists( $file_target ) ); if ( !move_uploaded_file( $file_source, $file_target ) ) { dump_json( array( "status" => 0, "message" => el( "写入文件出错,请与管理员联系!", "" ) ) ); } $_SESSION[SESSION_ID]['attach_cache'][] = array( "id" => $file_id, "name" => $file_name, "type" => "1", "path" => $file_target, "size" => $file_size ); dump_json( array( "status" => "1", "filename" => $file_name, "filesize" => $file_size, "file_id" => $file_id ) ); } else { dump_json(...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息