### 简要描述:
北京致远某系统越权访问
### 详细说明:
正常访问伙伴/员工下载连接
[<img src="https://images.seebug.org/upload/201402/242302491d5398c8d314bd87ac5d878a7f76718c.jpg" alt="0.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/242302491d5398c8d314bd87ac5d878a7f76718c.jpg)
[<img src="https://images.seebug.org/upload/201402/24230400cd6926df67696396e1800c11368d0117.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/24230400cd6926df67696396e1800c11368d0117.jpg)
使用抓包工具,然后点击确定……
[<img src="https://images.seebug.org/upload/201402/24230535f74ebbc7f7b075c4975ad26b28c38fca.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/24230535f74ebbc7f7b075c4975ad26b28c38fca.jpg)
在拦截的请求中,有一个首页的请求,删除该请求,放行其他请求……
[<img src="https://images.seebug.org/upload/201402/2423074721594c96d14f0ba1f0b3afb51ccf43ed.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/2423074721594c96d14f0ba1f0b3afb51ccf43ed.jpg)
[<img src="https://images.seebug.org/upload/201402/2423075918f9d135d1585063139891b6f130bf59.jpg" alt="4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/2423075918f9d135d1585063139891b6f130bf59.jpg)
[<img src="https://images.seebug.org/upload/201402/24230808931bdcb036f5298461fef221d9d8ea8c.jpg" alt="5.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/24230808931bdcb036f5298461fef221d9d8ea8c.jpg)
ok,结束……
PS:
内部员工下载相同方法~~
### 漏洞证明:
如上
暂无评论