Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The Zhiyuan OA Arbitrary File Upload Vulnerability is a critical vulnerability that affects the Zhiyuan OA software. This vulnerability allows remote unauthenticated attackers to upload arbitrary files to the remote server and execute arbitrary code.
The severity of this vulnerability is classified as critical, indicating the potential for significant damage and unauthorized access to sensitive information.
This module was authored by gy741.
If exploited, this vulnerability can lead to the execution of arbitrary code on the affected server. Attackers can upload malicious files, which may result in unauthorized access, data breaches, or further compromise of the system.
The module sends an HTTP GET request to the "/seeyon/thirdpartyController.do.css/..;/ajax.do" path. It then applies several matching conditions to determine if the vulnerability is present:
- The response must contain the phrase "java.lang.NullPointerException:null". - The response header must include the content type "text/html". - The response status code must be 200.If all the matching conditions are met, the module reports the vulnerability.
For more information, you can refer to the following resource: https://www.programmersought.com/article/92658169875/
To remediate this vulnerability, it is recommended to apply the appropriate patch or update provided by the Zhiyuan OA software.