用友NC-IUFO系统通用SQL注入(三)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: ... ### 详细说明: 该系统“忘记密码”模块存在sql注入漏洞 链接地址为:/epp/core/forgetpwd.jsp?pageId=forgetpwd&rand=1234 [<img src="https://images.seebug.org/upload/201501/10164647850329b74ce2a803fc0de1dd767da668.png" alt="QQ图片20150110164630.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/10164647850329b74ce2a803fc0de1dd767da668.png) 说明:输入用户名和邮箱后提交,程序会提交给 /epp/core(可从抓取的数据包中看到), 漏洞参数:userid 数据库系统:oracle 注入类型:AND/OR time-based blind 这里直接给出证明案例(列出数据库实例名称即可、不深入): 0x01; http://nc.xhlbdc.com/epp/ ``` POST /epp/core HTTP/1.1 Host: nc.xhlbdc.com Proxy-Connection: keep-alive Content-Length: 107 Origin: http://nc.xhlbdc.com Method: POST /epp/core HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36 Content-Type: application/x-www-form-urlencoded;charset=UTF-8 Accept: */* Referer: http://nc.xhlbdc.com/epp/core/forgetpwd.jsp?pageId=forgetpwd&rand=8438 Accept-Encoding: gzip,deflate,sdch...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息