### 简要描述:
### 详细说明:
上一枚: [WooYun: 用友某办公平台任意文件上传导致代码执行漏洞(全版本)](http://www.wooyun.org/bugs/wooyun-2014-060671)
intitle:"fe协作"
看问题代码
在\system\mediafile\fileupload.jsp中
```
None
```
shell直接在根目录当中,为test.jsp
http://oa.peizheng.net.cn/test.jsp
[<img src="https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg" alt="]XJRNIREAU[83[2WMXXXSFJ.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg)
### 漏洞证明:
http://oa.peizheng.net.cn/test.jsp
[<img src="https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg" alt="]XJRNIREAU[83[2WMXXXSFJ.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201408/10171640b1c0d2e10195eeea2fe9ae42dc5bfa6d.jpg)
暂无评论