### 简要描述: 北京致远某系统越权访问 ### 详细说明: 正常访问伙伴/员工下载连接 [<img src="https://images.seebug.org/upload/201402/242302491d5398c8d314bd87ac5d878a7f76718c.jpg" alt="0.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/242302491d5398c8d314bd87ac5d878a7f76718c.jpg) [<img src="https://images.seebug.org/upload/201402/24230400cd6926df67696396e1800c11368d0117.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/24230400cd6926df67696396e1800c11368d0117.jpg) 使用抓包工具,然后点击确定…… [<img src="https://images.seebug.org/upload/201402/24230535f74ebbc7f7b075c4975ad26b28c38fca.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/24230535f74ebbc7f7b075c4975ad26b28c38fca.jpg) 在拦截的请求中,有一个首页的请求,删除该请求,放行其他请求…… [<img src="https://images.seebug.org/upload/201402/2423074721594c96d14f0ba1f0b3afb51ccf43ed.jpg" alt="3.jpg" width="600"...
### 简要描述: 北京致远某系统越权访问 ### 详细说明: 正常访问伙伴/员工下载连接 [<img src="https://images.seebug.org/upload/201402/242302491d5398c8d314bd87ac5d878a7f76718c.jpg" alt="0.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/242302491d5398c8d314bd87ac5d878a7f76718c.jpg) [<img src="https://images.seebug.org/upload/201402/24230400cd6926df67696396e1800c11368d0117.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/24230400cd6926df67696396e1800c11368d0117.jpg) 使用抓包工具,然后点击确定…… [<img src="https://images.seebug.org/upload/201402/24230535f74ebbc7f7b075c4975ad26b28c38fca.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/24230535f74ebbc7f7b075c4975ad26b28c38fca.jpg) 在拦截的请求中,有一个首页的请求,删除该请求,放行其他请求…… [<img src="https://images.seebug.org/upload/201402/2423074721594c96d14f0ba1f0b3afb51ccf43ed.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/2423074721594c96d14f0ba1f0b3afb51ccf43ed.jpg) [<img src="https://images.seebug.org/upload/201402/2423075918f9d135d1585063139891b6f130bf59.jpg" alt="4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/2423075918f9d135d1585063139891b6f130bf59.jpg) [<img src="https://images.seebug.org/upload/201402/24230808931bdcb036f5298461fef221d9d8ea8c.jpg" alt="5.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/24230808931bdcb036f5298461fef221d9d8ea8c.jpg) ok,结束…… PS: 内部员工下载相同方法~~ ### 漏洞证明: 如上