Skip to content

Latest commit

 

History

History
12 lines (10 loc) · 2.22 KB

Weaver_ecology_XmlRpcServlet_Path_File_Read_Vulnerability.md

File metadata and controls

12 lines (10 loc) · 2.22 KB

Weaver ecology XmlRpcServlet Path File Read Vulnerability

Vulnerability Weaver ecology XmlRpcServlet Path File Read Vulnerability
Chinese name 泛微 e-cology XmlRpcServlet 接口文件读取漏洞
CVSS core 7.8
FOFA Query (click to view the results directly) ((body="szFeatures" && body="redirectUrl") || (body="rndData" && body="isdx") || (body="typeof poppedWindow" && body="client/jquery.client_wev8.js") || body="/theme/ecology8/jquery/js/zDialog_wev8.js" || body="ecology8/lang/weaver_lang_7_wev8.js" || body="src="/js/jquery/jquery_wev8.js" || (header="Server: WVS" && (title!="404 Not Found" && header!="404 Not Found"))) && header!="testBanCookie" && header!="Couchdb" && header!="JoomlaWor" && body!="<title>28ZE</title>"
Number of assets affected 111321
Description Weaver e-cology is an OA office system specifically designed for large and medium-sized enterprises, supporting simultaneous work on PC, mobile, and WeChat platforms.Attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., resulting in an extremely insecure state of the website.
Impact Attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., resulting in an extremely insecure state of the website.