通达OA集团最新版一处盲注漏洞demo测试(需登录)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 集团OA最新版,未过滤',然后再绕过过滤函数,root权限 ### 详细说明: 厂商官网:http://**.**.**.**/ 集团demo地址:**.**.**.**/ SQL漏洞地址: ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1 参数title可注入 ``` 这个点竟然没有过滤单引号' [<img src="https://images.seebug.org/upload/201510/19183301f5727cc2440b462979be90d3f57056d2.png" alt="1019-20.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/19183301f5727cc2440b462979be90d3f57056d2.png) 爆SQL语句: 提交: ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1%' and 1=2 union select ``` [<img src="https://images.seebug.org/upload/201510/19183439bd3193c3663c2c818b37301dceff7a90.png" alt="1019-21.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/19183439bd3193c3663c2c818b37301dceff7a90.png) 返回: ``` 不安全的SQL语句:联合查询 select count(*) as total from doc_send_data as a where 1 = 1 and title like '%1%' and 1=2 union select%' and status='6' and...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息