### 简要描述: eYou邮件系统存在越权+任意文件删除漏洞 ### 详细说明: #1 漏洞连接 文件删除:/admin/group/del_addition.php 文件上传:/admin/group/upload_addition.php ``` $ToRemove = post('ToRemove'); $size = @filesize($ToRemove); if(is_array($_SESSION['tmpName'])) { $key = array_search($ToRemove,$_SESSION['tmpName']); }else { $key = null; } if(file_exists($ToRemove)) { $res = @unlink($ToRemove); if($res == 1) { //文件被del了 if($size != false) { $_SESSION['size'] -= $size; if($_SESSION['size'] < 0 ) { $_SESSION['size'] = 0; } } unset($_SESSION['upload'][$key],$_SESSION['tmpName'][$key]); } } ``` $ToRemove = post('ToRemove');//接收post参数后没有经过任何的过滤 $res = @unlink($ToRemove); //没有经过任何过滤便进入了危险函数unlink,造成任意文件删除 #2 漏洞测试 google:intitle:亿邮通讯 选取如下网站: http://cma.org.cn/admin/group/upload_addition.php [<img src="https://images.seebug.org/upload/201404/21115802887803742344bb3211fe32d6f38cdfa8.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201404/21115802887803742344bb3211fe32d6f38cdfa8.jpg)...
### 简要描述: eYou邮件系统存在越权+任意文件删除漏洞 ### 详细说明: #1 漏洞连接 文件删除:/admin/group/del_addition.php 文件上传:/admin/group/upload_addition.php ``` $ToRemove = post('ToRemove'); $size = @filesize($ToRemove); if(is_array($_SESSION['tmpName'])) { $key = array_search($ToRemove,$_SESSION['tmpName']); }else { $key = null; } if(file_exists($ToRemove)) { $res = @unlink($ToRemove); if($res == 1) { //文件被del了 if($size != false) { $_SESSION['size'] -= $size; if($_SESSION['size'] < 0 ) { $_SESSION['size'] = 0; } } unset($_SESSION['upload'][$key],$_SESSION['tmpName'][$key]); } } ``` $ToRemove = post('ToRemove');//接收post参数后没有经过任何的过滤 $res = @unlink($ToRemove); //没有经过任何过滤便进入了危险函数unlink,造成任意文件删除 #2 漏洞测试 google:intitle:亿邮通讯 选取如下网站: http://cma.org.cn/admin/group/upload_addition.php [<img src="https://images.seebug.org/upload/201404/21115802887803742344bb3211fe32d6f38cdfa8.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201404/21115802887803742344bb3211fe32d6f38cdfa8.jpg) 上传任意文件,然后再进行删除的测试: 首先上传2.php 然后再选择删除,抓包修改文件地址 即可删除任意文件 [<img src="https://images.seebug.org/upload/201404/2112015264dd897726756741942fb23e9ef6022c.jpg" alt="111.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201404/2112015264dd897726756741942fb23e9ef6022c.jpg) ### 漏洞证明: 见详细说明