Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Zhiyuan OA Arbitrary File Upload Vulnerability

By kannthu

Vidoc logoVidoc Module

Zhiyuan OA Arbitrary File Upload Vulnerability

What is the "Zhiyuan OA Arbitrary File Upload Vulnerability?"

The Zhiyuan OA Arbitrary File Upload Vulnerability is a critical vulnerability that affects the Zhiyuan OA software. This vulnerability allows remote unauthenticated attackers to upload arbitrary files to the remote server and execute arbitrary code.

The severity of this vulnerability is classified as critical, indicating the potential for significant damage and unauthorized access to sensitive information.

This module was authored by gy741.


If exploited, this vulnerability can lead to the execution of arbitrary code on the affected server. Attackers can upload malicious files, which may result in unauthorized access, data breaches, or further compromise of the system.

How the module works?

The module sends an HTTP GET request to the "/seeyon/;/" path. It then applies several matching conditions to determine if the vulnerability is present:

- The response must contain the phrase "java.lang.NullPointerException:null". - The response header must include the content type "text/html". - The response status code must be 200.

If all the matching conditions are met, the module reports the vulnerability.

For more information, you can refer to the following resource:

To remediate this vulnerability, it is recommended to apply the appropriate patch or update provided by the Zhiyuan OA software.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: java.lang.NullPointerException:nulland
word: text/htmland
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability