用友协作办公平台再次通杀SQL注入

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 用友协作办公平台再次通杀SQL注入 由于绝大部分系统采用的是MSSQL,权限非常大,返回的shell 不是system 就是administrator ### 详细说明: #1 漏洞文件 /witapprovemanage/appraupNew.jsp 漏洞代码如下 ``` <% Dao dao = (Dao)ResourceManage.getContext("dao"); String master_key = ""; FieldSet fswm = null; String tablenameStr = ""; if(request.getParameter("flowid")!=null){ master_key = request.getParameter("flowid");//接收flowid参数 fswm= dao.getFieldSetByFilter(dao.getTableName("WF_MODEL")," WM00= '" + master_key + "'"); tablenameStr = fswm.getString("WM04"); } String resid = ""; if(request.getParameter("resid")!=null){ resid = request.getParameter("resid"); } //根据resid来查询出资源的信息. FieldSet resourceSet = null; String resType = ""; resourceSet= dao.getFieldSetByFilter(dao.getTableName("APPRV_RESOURCE")," ID= '" + resid + "'"); resType = resourceSet.getString("TYPE"); String restype = ""; if(request.getParameter("restype")!=null){ restype = request.getParameter("restype"); } String nodeid = ""; if(request.getParameter("nodeid")!=null){ nodeid =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息