S4E Mobile Logo

Weaver OA Common Controller Arbitrary File Upload Scanner

Detects 'Arbitrary File Upload' vulnerability in Weaver OA via the common controller upload mechanism. Identifies unrestricted file upload behavior that may enable remote code execution.

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

6 days 3 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

Weaver OA is a widely used office automation software in businesses and organizations, providing a collaborative platform for managing documents, tasks, and workflows. It is primarily used by corporate enterprises, governmental bodies, and other large organizations to streamline operations and increase productivity. The software allows users to share documents, collaborate on projects, and manage organizational resources effectively. As a critical tool for streamlining business processes, ensuring the security of Weaver OA is of significant importance. The software integrates with various other services and systems and serves as a central hub for document and process management in many enterprises.

The Arbitrary File Upload vulnerability in Weaver OA allows unauthorized users to upload files of different types without proper restrictions. This particular vulnerability can enable attackers to upload malicious scripts or executable files to the server. If the server executes these files, it could result in unauthorized access or complete takeover of the server. The lack of proper file type validation or enforcement of security policies on the upload functionality is the root cause of this vulnerability. Such vulnerabilities can be exploited for harmful activities such as defacement, data theft, or deploying further malicious exploits.

Technically, the vulnerability occurs due to inadequate validation mechanisms in the file upload feature of Weaver OA. The vulnerable endpoint is /weaver/weaver.common.Ctrl/, which is not sufficiently protected against uploads with dangerous file types. Attackers can manipulate the Content-Type headers and bypass existing file restrictions to upload scripts disguised as benign files. The malicious payload, typically a webshell, can then be accessed through indirect requests to the uploaded file path, enabling the attacker to execute code on the server.

When exploited, the Arbitrary File Upload vulnerability can lead to severe consequences for the affected system. Attackers may gain full access to the server, allowing them to manipulate or steal sensitive organizational data. Further implications involve the potential to alter or delete vital enterprise data, install backdoors for persistent access, and pivot to other parts of the network. This can lead to loss of data integrity, confidentiality breaches, and disruptions to business operations, causing financial and reputational damage.

Get started to protecting your digital assets