# 致远 OA 系统路径遍历及文件上传漏洞
## 漏洞概述
Zhiyuan OA平台中存在一个任意文件上传漏洞,通过wpsAssistServlet接口,攻击者可以上传恶意的JSP文件,导致远程代码执行。
## 影响版本
- 5.0
- 5.1 - 5.6sp1
- 6.0 - 6.1sp2
- 7.0
- 7.0sp1 - 7.1
- 7.1sp1
- 8.0 - 8.0sp2
## 漏洞细节
在处理multipart文件上传时,`realFileType`和`fileId`参数验证不足,允许未经身份验证的攻击者利用路径穿越技术将特制的JSP文件上传到非预定目录中。
## 漏洞影响
成功利用此漏洞后,攻击者可以通过web服务器访问和执行已上传文件,从而实现远程代码执行。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34040.yaml | POC详情 |
标题: Zhiyuan OA System Path Traversal File Upload | Advisories | VulnCheck -- 🔗来源链接
标签: third-party-advisory
神龙速读暂无评论