Skip to content

Zhiyuan OA Arbitrary File Upload Vulnerability

ID: zhiyuan-file-upload

Severity: critical

Author: gy741

Tags: zhiyuan,rce,fileupload,seeyon,intrusive

A vulnerability in Zhiyuan OA allows remote unauthenticated attackers to upload arbitrary files to the remote server and cause execute arbitrary code to be executed.

id: zhiyuan-file-upload
info:
name: Zhiyuan OA Arbitrary File Upload Vulnerability
author: gy741
severity: critical
description: A vulnerability in Zhiyuan OA allows remote unauthenticated attackers to upload arbitrary files to the remote server and cause execute arbitrary code to be executed.
remediation: Apply the appropriate patch.
reference:
- https://www.programmersought.com/article/92658169875/
metadata:
max-request: 1
tags: zhiyuan,rce,fileupload,seeyon,intrusive
http:
- method: GET
path:
- "{{BaseURL}}/seeyon/thirdpartyController.do.css/..;/ajax.do"
matchers-condition: and
matchers:
- type: word
words:
- "java.lang.NullPointerException:null"
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
# digest: 4b0a00483046022100cc2fd533204f85fdeba330c4ee9ebfd057ce5e6c19790f3211ce3d0f0d9b2505022100d31ced66333bf75847d6554ac3ee912947dea0a23fee8f49692413a8d6cad1db:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/seeyon/zhiyuan-file-upload.yaml"

View on Github