致远OA文件上传漏洞
时间: 2023-09-23 18:05:40 浏览: 140
致远OA存在文件上传漏洞,攻击者可以通过调用文件上传接口上传恶意文件,从而执行任意系统命令并控制目标服务器。\[2\]\[3\]该漏洞影响范围包括致远OA V8.0、V7.1、V7.0、V6.0、V6.1以及致远OA G6等版本。\[1\]攻击者可以通过构造精心设计的数据向目标服务器写入任意文件,并在写入成功后执行任意系统命令。这个漏洞的危害性非常高,因此建议用户及时升级致远OA的版本或者采取其他安全措施来防止此漏洞的利用。
#### 引用[.reference_title]
- *1* [致远OA ajax.do 任意文件上传 (CNVD-2021-01627) 漏洞复现](https://blog.csdn.net/qq2539879928/article/details/127811719)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^insert_down28v1,239^v3^insert_chatgpt"}} ] [.reference_item]
- *2* [致远OA wpsAssistServlet 任意文件上传漏洞 漏洞复现](https://blog.csdn.net/qq2539879928/article/details/127811791)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^insert_down28v1,239^v3^insert_chatgpt"}} ] [.reference_item]
- *3* [致远OA A8 htmlofficeservlet 任意文件上传漏洞 漏洞复现](https://blog.csdn.net/qq2539879928/article/details/127811833)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^insert_down28v1,239^v3^insert_chatgpt"}} ] [.reference_item]
[ .reference_list ]
阅读全文